eUICC Profile Package: Interoperable Format Test Specification
Version 1.0
Copyright © 2016 SIMalliance ltd. The information contained in this document may be used, disclosed and reproduced without the prior written authorization of SIMalliance. Readers are advised that SIMalliance reserves the right to amend and update this document without prior notice. Updated versions will be published on the SIMalliance website at http://www.simalliance.org
Securing the future of mobile services 2
Security, Identity, Mobility
Intellectual Property Rights (IPR) Disclaimer
Attention is drawn to the possibility that some of the elements of any material available for download from the
specification pages on SIMalliance's website may be the subject of Intellectual Property Rights (IPR) of third
parties, some, but not all, of which are identified below. SIMalliance shall not be held responsible for identifying
any or all such IPR, and has made no inquiry into the possible existence of any such IPR. SIMALLIANCE
SPECIFICATIONS ARE OFFERED WITHOUT ANY WARRANTY WHATSOEVER, AND IN PARTICULAR,
ANY WARRANTY OF NON-INFRINGEMENT IS EXPRESSLY DISCLAIMED. ANY IMPLEMENTATION OF
ANY SIMALLIANCE SPECIFICATION SHALL BE MADE ENTIRELY AT THE IMPLEMENTER'S OWN RISK,
AND NEITHER SIMALLIANCE, NOR ANY OF ITS MEMBERS OR SUBMITTERS, SHALL HAVE ANY
LIABILITY WHATSOEVER TO ANY IMPLEMENTER OR THIRD PARTY FOR ANY DAMAGES OF ANY
NATURE WHATSOEVER DIRECTLY OR INDIRECTLY ARISING FROM THE IMPLEMENTATION OF ANY
SIMALLIANCE SPECIFICATION.
Securing the future of mobile services 3
Security, Identity, Mobility
Table of Contents
1. Objective .................................................................................................................... 6
2. Introduction ............................................................................................................... 6
3. References ................................................................................................................. 7
3.1 Normative References .................................................................................................................. 7
3.2 Informative References ................................................................................................................. 8
4. Abbreviations ............................................................................................................ 8
5. Definitions .................................................................................................................. 9
6. Test environment .................................................................................................... 11
6.1 Table of optional features ............................................................................................................ 11
6.2 Applicability table ........................................................................................................................ 12
6.3 Optional features and applicability tables formatting .................................................................. 13 6.3.1 Format of the table of optional features................................................................................................... 13
6.3.2 Format of the applicability table .............................................................................................................. 13
6.3.3 Status and Notations ............................................................................................................................... 14
6.4 Test environment description ...................................................................................................... 14
6.5 Test equipment............................................................................................................................ 15
6.6 Test execution ............................................................................................................................. 15 6.6.1 General Initial Conditions ........................................................................................................................ 15
6.7 Pass criterion............................................................................................................................... 15
6.8 Indications concerning support of features ................................................................................. 15
6.9 eUICC Initalisation Procedures ................................................................................................... 16
6.10 Profile loading.............................................................................................................................. 16
6.11 Profile enabling ........................................................................................................................... 16
6.12 Test PE description ..................................................................................................................... 17 6.12.1 Basic Profile Package PE-s .................................................................................................................... 17
6.12.1.1. Profile Header ..................................................................................................................................... 19
6.12.1.2. PE MF ................................................................................................................................................. 19
6.12.1.3. PE PUKCodes .................................................................................................................................... 20
6.12.1.4. PE PINCodes ..................................................................................................................................... 21
6.12.1.5. PE USIM ............................................................................................................................................. 22
6.12.1.6. PE PINCodes (Local PIN) ................................................................................................................... 24
6.12.1.7. PE AKA Parameter ............................................................................................................................. 24
Securing the future of mobile services 4
Security, Identity, Mobility
6.12.1.8. PE SecurityDomain (MNO SD) ........................................................................................................... 25
6.12.1.9. PE Security Domain (SSD) ................................................................................................................. 26
6.12.1.10. PE Application ................................................................................................................................ 28
6.12.1.11. PE RFM .......................................................................................................................................... 29
6.12.1.12. PE End ........................................................................................................................................... 29
6.12.2 Customised PEs ..................................................................................................................................... 29
6.12.2.1. PE Security Domain............................................................................................................................ 29
6.12.2.2. PE Application .................................................................................................................................... 36
7. Profile Package General Structure ........................................................................ 40
7.1 Test requirements ....................................................................................................................... 40
7.2 Test cases / scenarios ................................................................................................................ 40
8. Profile Package Elements Definition ..................................................................... 41
8.1 Test requirements ....................................................................................................................... 41 8.1.1 Common types ........................................................................................................................................ 41
8.1.2 Profile header .......................................................................................................................................... 43
8.1.3 File system .............................................................................................................................................. 43
8.1.4 NAA(s) .................................................................................................................................................... 44
8.1.5 PIN and PUK codes ................................................................................................................................ 45
8.1.6 Security domains .................................................................................................................................... 46
8.1.7 Application loading and installation ......................................................................................................... 48
8.1.8 RFM Parameters ..................................................................................................................................... 51
8.1.9 Non standardised content ....................................................................................................................... 51
8.1.10 Profile Package end ................................................................................................................................ 51
8.1.11 eUICC Response type ............................................................................................................................ 52
8.2 Test cases / scenarios ................................................................................................................ 53 8.2.1 Check Profile Format .............................................................................................................................. 53
8.2.1.1. Installing PE-USIM when eUICC supports USIM (File system created by generic file manager) ....... 53
8.2.1.2. Installing PE-USIM when eUICC supports USIM (file system created by template) ........................... 53
8.2.1.3. Installing PE-USIM when eUICC does not support USIM ................................................................... 54
8.2.1.4. Installing profile without ProfileHeader PE .......................................................................................... 56
8.2.1.5. Installing profile with PE-USIM before PE-MF, eUICC reports error. .................................................. 56
8.2.1.6. Installing profile with PE-Application before PE-SecurityDomain, eUICC reports error. ..................... 57
8.2.1.7. Installing profile with PE-RFM before PE-SecurityDomain, eUICC reports error. ............................... 58
8.2.1.8. Installing profile with PE-USIM before PE-MF, eUICC supports the installation. ................................ 58
8.2.1.9. Installing profile with PE-Application before PE-SecurityDomain, eUICC supports the installation. ... 58
8.2.1.10. Installing profile with PE-RFM before PE-SecurityDomain, eUICC supports the installation. ............. 58
8.2.2 Check PE Security Domain ..................................................................................................................... 59
8.2.2.1. Check mandatory elements in PE Security Domain ........................................................................... 59
Securing the future of mobile services 5
Security, Identity, Mobility
8.2.2.2. Check key list in PE Security Domain ................................................................................................. 60
8.2.2.3. Check number of keyComponent objects ........................................................................................... 61
8.2.2.4. Check sdPersoData ............................................................................................................................ 62
8.2.2.5. Check OTA HTTPs Personalisation ................................................................................................... 63
8.2.3 Check PE Application.............................................................................................................................. 64
8.2.3.1. Check Application PE (PE_Applet) and mandatory elements in ApplicationInstance ......................... 64
8.2.3.2. Check all elements in ApplicationLoadPackage – taking size into account. ....................................... 65
8.2.3.3. Check all elements in ApplicationInstance .......................................................................................... 66
8.2.3.4. Error when load a PE-Applet4 and bad library is provided. ................................................................ 67
8.2.3.5. Check multiple ApplicationInstance. ................................................................................................... 68
9. ANNEX A (Informative) : Document history .......................................................... 70
Securing the future of mobile services 6
Security, Identity, Mobility
1. Objective
The objective of this document is to define the test specification of the interoperable eUICC Profile.
This specification is based on the following SIMalliance document: eUICC Profile Package:
Interoperable Format Technical Specification v1.0.1.
2. Introduction
This specification has the objective of testing if a profile is correctly interpreted and correctly loaded on
an eUICC.
This document is agnostic on the format of the eUICC: both soldered (embedded in a device) and non-
soldered (stand-alone) eUICCs can be the subject of testing. The test cases are written so that they can
be used to test both soldered and non-soldered eUICC formats.
The elements within the scope of this test specification are described in the following figure:
Test Profile
Implementation Under
Test (IUT)
Test Procedureexchange
Profile Interpreter
Test Profile
Elements of the Test Suite
Scope of the Test Suite
Profile Manager
Test equipment / Server
eUICC
Default Profile
Test APDU
Figure 1: Scope of the testing
Securing the future of mobile services 7
Security, Identity, Mobility
3. References
3.1 Normative References
[SA PP RS]: SIMalliance eUICC Profile Package: Interoperability Functional Requirements
V1.1
[SA PP TS]: SIMalliance eUICC Profile Package: Interoperable Format Technical Specification
V1.0.1
[101 220]: ETSI TS 101 220 - V12.0.0: Smart Cards; ETSI numbering system for
telecommunication application providers (Release 12)
[102 221]: ETSI TS 102 221 V12.0.0: Smart Cards; UICC-Terminal interface; Physical and
logical characteristics (Release 12)
[102 222]: ETSI TS 102 222 V7.1.0: Integrated Circuit Cards (ICC); Administrative commands
for telecommunications applications (Release 7)
[102 226]: ETSI TS 102 226 V12.0.0: Smart Cards; Remote APDU structure for UICC based
applications (Release 12)
[USIM]: 3GPP TS 31.102 V12.6.0: Characteristics of the Universal Subscriber Identity Module
(USIM) application (Release 12)
[ISIM]: 3GPP TS 31.103 V12.2.0: Characteristics of the IP Multimedia Services Identity
Module (ISIM) application (Release 12)
[CSIM]: 3GPP2 C.S0065-C v1.0: cdma2000 Application on UICC for Spread Spectrum
Systems
[GP CS]: GlobalPlatform Card Specification V2.2.1
[GP UC]: GlobalPlatform Card Specification UICC Configuration V1.0.1
[GP AA]: Confidential Card Content Management; GlobalPlatform Card Specification
Amendment A v1.0.1
[GP AB]: GlobalPlatform Card Remote Application Management over HTTP Card
Specification v2.2 – Amendment B v1.1.2
[X.680]: ITU-T X.680 (11/2008): Abstract Syntax Notation One (ASN.1): Specification of basic
notation including Corrigendum 1 and 2
[X690]: ITU-T X.690 (11/2008): ASN.1 Encoding Rules: Specification of Basic Encoding Rules
(BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) including
Corrigendum 1 and 2
[102 230-2]: ETSI TS 102 230-2 V9.0.0: Smart Cards; UICC-Terminal interface; Physical,
electrical and logical test specification; Part 2: UICC features;
[103 484-2]: ETSI TS 103 484-2 V9.0.0: Smart Cards; Test specification for the Secure
Channel interface; Part 2: UICC features
[USIM Test]: 3GPP TS 31.122 V12.0.0: Universal Subscriber Identity Module (USIM)
conformance test specification (Release 12)
[UICC]: 3GPP TS 31.101 V12.2.0: UICC-terminal interface; Physical and logical
characteristics (Release 12)
Securing the future of mobile services 8
Security, Identity, Mobility
[GS RPT]: GSMA Remote Provisioning Architecture for Embedded UICC Technical
Specification V2.0
[MILENAGE]: 3GPP TS 35.207: 3G Security; Specification of the MILENAGE algorithm set:
An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2,
f3, f4, f5 and f5*; Document 3: Implementors' test data
[TUAK]: 3GPP TS 35.233: Specification of the TUAK algorithm set: A second example
algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and
f5*; Document 3: Design conformance test data
[GS RPAT]: GSMA Remote Provisioning Architecture for Embedded UICC, Test Specification
Version 1.0 ,13 October 2014
3.2 Informative References
[GS RPA]: GSMA Remote Provisioning Architecture for Embedded UICC V1.1
[102 383]: ETSI TS 103 383 V12.7.0: Smart Cards; Embedded UICC; Requirements
Specification (Release 12)
4. Abbreviations
ADF Application Dedicated File
AID Application Identifier
AKA Authentication and Key Agreement
APDU Application Protocol Data Unit
ASN.1 Abstract Syntax Notation One
CASD Controlling Authority Security Domain
CD Configuration Data
CDMA Code Division Multiple Access
CSIM cdma2000 Subscriber Identify Identity Module
CIN Card Image Number / Card Identification Number
DF Dedicated File
DGI Data Grouping Identifier
DO Data Object
EAP Extensible Authentication Protocol
EF Elementary File
eUICC embedded UICC
EUM eUICC Manufacturer
FCP File Control Parameters
FFS For Further Study
GBA Generic Bootstrapping Architecture
HCI Host Controller Interface
ICCID Integrated Circuit Card ID
ID Identifier
IIN Issuer Identification Number
Securing the future of mobile services 9
Security, Identity, Mobility
IMSI International Mobile Subscriber Identity
ISD-P Issuer Security Domain Profile
ISIM IP Multimedia Services Identity Module
IUT Implementation Under Test
LCSI Life Cycle Status Information
M2M Machine to Machine
MAC Message Authentication Code
MAC-A MAC used for authentication and key agreement
MBMS Multimedia Broadcast/Multicast Service
MNO Mobile Network Operator
MNO-SD Mobile Network Operator Security Domain (Root SD of a Profile)
NAA Network Access Application
NAC Network Access Control
OID Object Identifier
OS Operating System (of the eUICC)
OTA Over the Air
PE Profile Element
PIN Personal Identification Number
POL Policy Rules within the Profile
PUK PIN Unblocking Key
RAM Remote Application Management
RFM Remote File Management
RQ Requirement
SCP Secure Channel Protocol
SD Security Domain
SP Service Provider
SQN Sequence Number
SSD Supplementary Security Domain
SW Status Word
SWP Single Wire Protocol
T Test Tool
USIM Universal Subscriber Identity Module
5. Definitions
Default Profile A profile which can be used to connect to the network.
embedded UICC A UICC which is not easily accessible or replaceable, is not intended to be removed or replaced in the terminal, and enables the secure changing of subscriptions.
Policy Rules Defines the atomic action of a policy and the conditions under which it is executed.
Profile Combination of a file structure, data and applications on an eUICC.
Profile Creator External entity in charge of creating the Profile Package based on MNO
requirements, protecting the Profile Package from modification and/or
content access.
Securing the future of mobile services 10
Security, Identity, Mobility
Profile Element A Profile Element is a part of the Profile Package representing one or several
features of the Profile encoded using TLV structures based on ASN.1
description.
Profile Interpreter On card entity which interprets and translates the ASN profile data to objects
residing on the eUICC (files, SD-s, applications, keys, etc.).
Profile Manager On-card entity, which is able to load, install, activate and deactivate a profile
as per GSMA [GS RPT].
Profile Package A Personalised Profile using an interoperable description format transmitted
to an eUICC in order to load and install a Profile.
Provisioning The downloading and installation of a Profile into an eUICC.
Remote Provisioning Provisioning done by the subscription manager on an eUICC outside of his
premises, using a secure data link.
Securing the future of mobile services 11
Security, Identity, Mobility
6. Test environment
6.1 Table of optional features The supplier of the implementation shall state the support of possible options in table 1.
Table 1: Options
Item Option Status Support Mnemonic
1 Support of USIM O O_USIM
2 Support of ISIM O O_ISIM
3 Support of CSIM O O_CSIM
4 Support of milenage O O_MILENAGE
5 Support of TUAK O O_TUAK
6 Support of CAVE O O_CAVE
7 Support of GBA-USIM O O_GBA_USIM
8 Support of GBA-ISIM O O_GBA_ISIM
9 Support of MBMS O O_MBMS
10 Support of EAP O O_EAP
11 Support Contactless O O_CONTACTLESS
12 Support of Java Card O O_JAVACARD
13 Support of Multos O O_MULTOS
14 Support of ETSI TS 102 613 and TS 102 622 Card-emulation Mode
O O_CARDEMULATION
15 Support of ETSI TS 102 613 and TS 102 622 Reader Mode
O O_READER_MODE
16 Support of GlobalPlatform UICC Configuration O O_UICC_CONFIGURATION
17
Support of File System creation by Generic File Management PE Note: this option for PE-MF is not clearly stated in version 1 of the core specification
O
O_FILE_SYSTEM_BY_FILE_MANAGER
18 Support of File System creation by template O O_FILE_SYSTEM_BY_TEM
PLATE
19
For ApplicationLoadPackage, the following parameters are supported: nonVolatileCodeLimitC6 volatileDataLimitC7 nonVolatileDataLimitC8
O
O_MEMORY_LIMIT
20 For ApplicationLoadPackage hashValueis supported
O O_HASHVALUE
21 The eUICC reports error when profile with PE-USIM before PE-MF is loaded
O O_ERROR_FOR_PE_USIM_BEFORE PE_MF
22 The eUICC reports error when profile with PE-Application before PE-SecurityDomain is loaded
O O_ERROR_FOR_PE_APPLICATION_BEFORE PE_SECURITYDOMAIN
23 The eUICC reports error when profile with PE-RFM before PE-SecurityDomain is loaded
O O_ERROR_FOR_PE_RFM_BEFORE PE_SECURITYDOMAIN
24 The eUICC is able to correctly load profiles with PE-USIM before PE-MF
O O_SUPPORT_PE_USIM_BEFORE PE_MF
25 The eUICC is able to correctly load profiles with PE-Application before PE-SecurityDomain
O O_SUPPORT_PE_APPLICATION_BEFORE PE_SECURITYDOMAIN
26 The eUICC is able to correctly load profiles with PE-RFM before PE-SecurityDomain
O O_SUPPORT_PE_RFM_BEFORE PE_SECURITYDOMAIN
Securing the future of mobile services 12
Security, Identity, Mobility
The following dependencies exist between the options:
At least one of the NAA options O_USIM and O_CSIM shall be supported.
If O_USIM is supported, then the algorithm option O_MILENAGE shall be supported.
When O_GBA_USIM is supported also O_USIM shall be supported.
When O_GBA_ISIM is supported also O_ISIM shall be supported.
At least one of the runtime environments O_JAVACARD and O_MULTOS shall be supported.
6.2 Applicability table Table 2 a) specifies the applicability of each test case to the IUT.
Table 2 a): Applicability of tests
Test case Description Major Version
Major version 1
Support
Profile Package General Structure tests
FFS
Profile Package Elements Definition tests
Check Profile Format
8.2.1.1 Installing PE-USIM when eUICC supports USIM (File system
created by generic file manager) 2 N/A
8.2.1.2 Installing PE-USIM when eUICC supports USIM (File system
created by template) 1 C002
8.2.1.3 Installing PE-USIM when eUICC does not support USIM 1 C003
8.2.1.4 Installing profile without ProfileHeader PE 1 C002
8.2.1.5 Installing profile with PE-USIM before PE-MF, eUICC reports error 1 C006
8.2.1.6 Installing profile with PE-Application before PE-SecurityDomain,
eUICC reports error 1 C007
8.2.1.7 Installing profile with PE-RFM before PE-SecurityDomain, eUICC
reports error 1 C008
Check PE Security Domain
8.2.2.1 Check mandatory elements in PE Security Domain 1 C002
8.2.2.2 Check key list in PE Security Domain 1 C002
8.2.2.3 Check number of keyComponent objects 1 C002
8.2.2.4 Check sdPersoData 1 C002
8.2.2.5 Check OTA HTTPs Personalisation 1 C002
Check PE Application
8.2.3.1 Check Application PE (PE_Applet1) and mandatory elements in
ApplicationInstance 1 C002
8.2.3.2 Check all elements in ApplicationLoadPackage – taking size into
account
1 C002
8.2.3.3 Check all elements in ApplicationInstance 1 C002
8.2.3.4 Error when load a PE-Applet4 and bad library is provided. 1 C002
8.2.3.5 Check multiple ApplicationInstance. 1 C002
Securing the future of mobile services 13
Security, Identity, Mobility
Table 2 b): Conditional items referenced by table 2 a)
Conditional item Condition
C001 IF (O_USIM SUPPORTED AND O_FILE_SYSTEM_BY_FILE_MANAGER SUPPORTED) THEN M ELSE N/A
C002 IF (O_USIM SUPPORTED AND O_FILE_SYSTEM_BY_TEMPLATE SUPPORTED) THEN M ELSE N/A
C003 IF O_USIM NOT SUPPORTED THEN M ELSE N/A
C004 IF O_MEMORY_LIMIT SUPPORTED THEN M ELSE N/A
C005 IF O_HASHVALUE SUPPORTED THEN M ELSE N/A
C006 IF O_ERROR_FOR_PE_USIM_BEFORE PE_MF THEN M ELSE N/A
C007 IF O_ERROR_FOR_PE_APPLICATION_BEFORE PE_SECURITYDOMAIN THEN M ELSE N/A
C008 IF O_ERROR_FOR_PE_RFM_BEFORE PE_SECURITYDOMAIN THEN M ELSE N/A
6.3 Optional features and applicability tables formatting
6.3.1 Format of the table of optional features
The columns in table 4.1 have the following meaning.
Column Meaning
Option: The optional feature supported or not by the implementation.
Status: See clause 7.3.3, ‘Status and Notations’.
Support: The support columns are to be filled in by the supplier of the implementation. The following common notations are used for the support column in table 1.
Y or y supported by the implementation;
N or n not supported by the implementation;
N/A, n/a or - no answer required (allowed only if the status is N/A, directly or after evaluation of a conditional status).
Mnemonic: The mnemonic column contains mnemonic identifiers for each item.
6.3.2 Format of the applicability table
The applicability of every test in table 2 a) is formally expressed by the use of Boolean expressions defined in
the following clause.
The columns in table 2 a) have the following meaning:
Column Meaning
Test case: The “Test case” column gives a reference to the test case number(s) detailed in the present document and required to validate the implementation of the corresponding item in the “Description” column.
Description: In the “Description” column a short non-exhaustive description of the requirement is found.
Major Version: The “Major Version” column gives the Technical Specification version applicable and onwards, for the item in the “Description” column.
Major Version X:
For the given Release, the corresponding “Major Version X” column lists the tests required for a UICC to be declared compliant with this Release.
Support: The “Support” column is blank in the proforma, and is to be completed by the manufacturer in respect of each particular requirement to indicate the choices that have been made in the implementation.
Securing the future of mobile services 14
Security, Identity, Mobility
6.3.3 Status and Notations
The “Rel-x UICC” columns show the status of the entries as follows:
The following notations are used for the status column:
M mandatory – the capability is required to be supported.
O optional – the capability may be supported or not.
N/A not applicable – in the given context, it is impossible to use the capability.
X prohibited (excluded) – there is a requirement not to use this capability in the given context.
O.i qualified optional – for mutually exclusive or selectable options from a set. “i” is an integer
which identifies an unique group of related optional items and the logic of their selection, which is
defined immediately following the table.
Ci conditional – the requirement on the capability (“M”, “O”, “X” or “N/A”) depends on the support
of other optional or conditional items. “i” is an integer identifying an unique conditional status
expression, which is defined immediately following the table. For nested conditional expressions, the
syntax “IF ... THEN (IF ... THEN ... ELSE...) ELSE ...” is to be used to avoid ambiguities.
6.4 Test environment description The general architecture for the test environment is:
Test Profile
Implementation Under
Test (IUT)
Test Procedureexchange
Profile Interpreter
Test Profile
Elements of the Test Suite
Scope of the Test Suite
Profile Manager
Test equipment / Server
eUICC
Default Profile
Test APDU
Figure 2: Test environment description
Securing the future of mobile services 15
Security, Identity, Mobility
6.5 Test equipment The test equipment shall meet the following requirements:
the result of I/O commands shall be presented at the application layer.
it shall be able to provide results of the tests.
it shall be able to accept all valid status codes returned.
it shall send all data specified in the test profile.
it may be able to send and receive commands remotely to/from the IUT, OR
it may provide a terminal simulation that is connected to the IUT during test procedure execution,
unless otherwise specified. With respect to the eUICC, the terminal simulation shall act according to
ETSI TS 102 221 [102 221], 3GPP TS 31.101 [UICC] (if this interface is present at the UICC) and
3GPP TS 31.102 [USIM], unless otherwise specified. The terminal simulation may provide the
possibility to monitor the eUICC on the ETSI TS 102 221 [102 221] interface if this interface is
accessible.
6.6 Test execution The order of the PE-s in the Test Profiles shall be kept as it is defined in the “Test Execution” subchapter of
each test case.
After each test case execution, the eUICC shall be put back to its initial state.
6.6.1 General Initial Conditions
The General Initial Conditions are a set of general prerequisites for the IUT prior to the execution of testing.
For each test procedure described in the present document, the following rules apply to the Initial Conditions:
Unless otherwise stated, the IUT shall be reset before each test procedure.
The ISD-P shall be installed and personalised.
6.7 Pass criterion A test shall be considered as successful, only if the test procedure was carried out successfully with the IUT
respecting all conformance requirements referenced in the test procedure.
NOTE: Within the test procedures, the RQs are referenced in the step where they are observable. In some
cases, this is different from the step where they occur with respect to the IUT.
6.8 Indications concerning support of features For the following features, if the file system is using the PE template, the eUICC shall support the given related
Pes (optional for the profiles):
When supporting the USIM feature, the following PEs are mandatory to support: PE-USIM, PE-CD,
PE-TELECOM, PE-OPT-USIM, PE-GSM-ACCESS, PE-PHONEBOOK, USIM Related Files and
Directories PEs.
When supporting the ISIM feature, the following PEs are mandatory to support: PE-ISIM, PE-CD, PE-
OPT-ISIM, ISIM Related Files and Directories PEs.
When supporting the CSIM feature, the following PEs are mandatory to support: PE-CSIM, PE-CD,
PE-OPT-CSIM, CSIM Related Files and Directories PEs.
Securing the future of mobile services 16
Security, Identity, Mobility
When supporting the milenage feature, support of the following PE is mandatory: PE-AKAParameters.
When supporting the tuak feature, support of the following PE is mandatory: PE-AKAParameters.
The following PEs are mandatorily supported by the eUICC, regardless of the supported feature: PE-
PINCodes, PE-PUKCodes, PE-SecurityDomain, PE-Application, PE-RFM, PE-End, file systems PEs (PE-MF,
PE-CD, PE-TELECOM), Generic File management PEs.
The eUICC is required to recognise PE-NonStandard in a profile, but the processing of the content is not
mandatory.
File management templates may also be expressed using the appropriate generic file management.
6.9 eUICC Initalisation Procedures This procedure shall be applied by the test tool only when the eUICC under test is in an unsoldered format.
When the eUICC under test is embedded in a device, the initialisation procedure is accomplished by the device.
To initialise the communication between T and the eUICC, these commands shall be executed:
Step Direction Description RQ
1 T → eUICC RESET
2 eUICC -> T ATR
3 T → eUICC [TERMINAL_PROFILE]
4 eUICC -> T Toolkit initialization
SW=’9000’
The value of the [TERMINAL_PROFILE] is the same as specified by [GS RPAT] in Annex E1.
NOTE: It is assumed that some proactive commands may be sent by the eUICC after sending the TERMINAL
PROFILE (i.e. SET UP EVENT LIST, POLL INTERVAL, PROVIDE LOCAL INFORMATION…). In this case, T
shall send the corresponding FETCH and TERMINAL RESPONSE (successfully performed) commands.
6.10 Profile loading Profile packages shall be loaded using the respective standard procedures supported by the eUICC (e.g.
GSMA Remote Provisioning Architecture for Embedded UICC Technical Specification V2.0 [GS RPT]).
6.11 Profile enabling Profile packages shall be enabled using the respective standard procedures supported by the eUICC (e.g.
GSMA Remote Provisioning Architecture for Embedded UICC Technical Specification V2.0 [GS RPT]).
Securing the future of mobile services 17
Security, Identity, Mobility
6.12 Test PE description
6.12.1 Basic Profile Package PE-s
The Basic Profile contains the following components:
MF and USIM ADF.
PIN and PUK codes.
NAA using milenage algorithm.
MNO-SD supporting SCP80 in 3DES.
SSD supporting SCP80 in 3DES.
Applet.
RFM application.
The parameters below have been chosen to personalise the Profile:
Profile type: “SIMalliance Profile Package”.
ICCID: ‘89019990001234567893’.
IMSI: 234101943787656.
MNO-SD AID / TAR: ‘A000000151000000’ / ‘B20100’.
RFM application AID / TAR: ‘A000000151000000’ / ‘B00010’.
Executable Load File AID for SD: ‘A0000001515350’.
Executable Module AID for SD: ‘A000000151000000’.
SSD AID / TAR: ‘A00000055910100102736456616C7565’ / ‘6C7565’.
All access rules are defined in table 1.
Access rule
name
Access conditions Hexadecimal value
READ UPDATE INCREASE ACTIVATE DEACTIVATE
ACCESS_RULE1 ALWAYS PIN1 NEVER ADM1 ADM1
800102A406830101950108
8401329700
800118A40683010A950108
ACCESS_RULE2 PIN1 ADM1 NEVER ADM1 ADM1
800101A406830101950108
80011AA40683010A950108
8401329700
ACCESS_RULE3 ADM1 ADM1 NEVER ADM1 ADM1 80011BA40683010A950108
8401329700
ACCESS_RULE4 ALWAYS NEVER NEVER NEVER NEVER
8001019000
80011A9700
8401329700
ACCESS_RULE5 PIN1 PIN1 NEVER ADM1 ADM1
800103A406830101950108
8401329700
800118A40683010A950108
ACCESS_RULE6 PIN1 ADM1 NEVER PIN1 ADM1
800111A406830101950108
8401329700
80010AA40683010A950108
ACCESS_RULE7 2ndPIN1 PIN1 PIN1 ADM1 ADM1
800107A406830181950108
800118A40683010A950108
840132A406830101950108
ACCESS_RULE8 PIN1 PIN2 NEVER ADM1 ADM1
800101A406830101950108
800102A406830102950108
8401329700
ACCESS_RULE9 ALWAYS PIN1 NEVER PIN1 PIN1 8001019000
Securing the future of mobile services 18
Security, Identity, Mobility
Access rule
name
Access conditions Hexadecimal value
READ UPDATE INCREASE ACTIVATE DEACTIVATE
8401329700
80011AA406830101950108
ACCESS_RULE10 ALWAYS ADM1 NEVER ADM1 ADM1
8001019000
80011AA40683010A950108
8401329700
ACCESS_RULE11 ALWAYS NEVER NEVER ADM1 ADM1
8001019000
800118A40683010A950108
8001029700
8401329700
ACCESS_RULE12 PIN1 NEVER NEVER NEVER NEVER
800101A406830101950108
80011A9700
8401329700
Table 1: Access Rules
Note that all these parameters may be freely adapted if tests require.
Securing the future of mobile services 19
Security, Identity, Mobility
6.12.1.1. Profile Header
PE_HEADER
headerValue ProfileElement ::= header : {
major-version 1,
minor-version 0,
profileType “SIMalliance Profile Package”,
iccid ‘89019990001234567893’H,
eUICC-Mandatory-services {
usim NULL,
milenage NULL,
javacard NULL
},
eUICC-Mandatory-GFSTEList {
-- MF-ID
{2 23 143 1 2 1},
-- USIM-ID
{2 23 143 1 2 4}
}
}
A0498001 01810100 821B5349 4D616C6C
69616E63 65205072 6F66696C 65205061
636B6167 65830A89 01999000 12345678
93A50681 0084008B 00A61006 0667810F
6.12.1.2. PE MF
PE_MF
mfValue ProfileElement ::= mf : {
mf-header {
mandated NULL,
identification 1
},
templateID {2 23 143 1 2 1},
mf {
},
ef-iccid {
fileDescriptor {
-- reference to the #ACCESS_RULE11
securityAttributesReferenced ‘2F060B’H
},
-- swapped ICCID: 98109909002143658739
fillFileContent ‘98109909002143658739’H
},
ef-dir {
fileDescriptor {
-- Shareable Linear Fixed File
-- 4 records, record length: 38 bytes
fileDescriptor ‘4221002604’H,
-- reference to the #ACCESS_RULE10
securityAttributesReferenced ‘2F060A’H
},
-- USIM AID: A0000000871002FF33FF018900000100
fillFileContent
‘61184F10A0000000871002FF33FF01890000010050045
553494D’H
},
ef-arr {
fileDescriptor {
-- Shareable Linear Fixed File
-- 15 records, record length: 47 bytes
fileDescriptor ‘4221002F0F’H,
-- reference to the #ACCESS_RULE10
securityAttributesReferenced ‘2F060A’H
},
B08201BD A0058000 81010181 0667810F
010201A2 00A413A1 058B032F 060B830A
98109909 00214365 8739A52A A10C8205
42210026 048B032F 060A831A 61184F10
A0000000 871002FF 33FF0189 00000100
50045553 494DA682 0167A10C 82054221
002F0F8B 032F060A 831B8001 02A40683
01019501 08840132 97008001 18A40683
010A9501 08820114 831B8001 01A40683
01019501 0880011A A4068301 0A950108
84013297 00820114 83108001 1BA40683
010A9501 08840132 97008201 1F830F80
01019000 80011A97 00840132 97008201
20831B80 0103A406 83010195 01088401
32970080 0118A406 83010A95 01088201
14831B80 0111A406 83010195 01088401
32970080 010AA406 83010A95 01088201
14832180 0107A406 83018195 01088001
18A40683 010A9501 08840132 A4068301
01950108 82010E83 1B800101 A4068301
01950108 800102A4 06830102 95010884
01329700 82011483 15800101 90008401
32970080 011AA406 83010195 01088201
1A831580 01019000 80011AA4 0683010A
95010884 01329700 82011A83 1A800101
90008001 18A40683 010A9501 08800102
97008401 32970082 01158315 800101A4
06830101 95010880 011A9700 84013297
Securing the future of mobile services 20
Security, Identity, Mobility
fillFileContent
‘800102A4068301019501088401329700800118A406830
10A950108’H,
fillFileOffset 20,
fillFileContent
‘800101A40683010195010880011AA40683010A9501088
401329700’H,
fillFileOffset 20,
fillFileContent
‘80011BA40683010A9501088401329700’H,
fillFileOffset 31,
fillFileContent
‘800101900080011A97008401329700’H,
fillFileOffset 32,
fillFileContent
‘800103A4068301019501088401329700800118A406830
10A950108’H,
fillFileOffset 20,
fillFileContent
‘800111A4068301019501088401329700
80010AA40683010A950108’H,
fillFileOffset 20,
fillFileContent
‘800107A406830181950108800118A40683010A9501088
40132A406830101950108’H,
fillFileOffset 14,
fillFileContent
‘800101A406830101950108800102A406830102950108
8401329700’H,
fillFileOffset 20,
fillFileContent ‘80010190008401329700
80011AA406830101950108’H,
fillFileOffset 26,
fillFileContent
‘800101900080011AA40683010A9501088401329700’H,
fillFileOffset 26,
fillFileContent
‘8001019000800118A40683010A9501088001029700840
1329700’H,
fillFileOffset 21,
fillFileContent
‘800101A40683010195010880011A97008401329700’H
}
}
6.12.1.3. PE PUKCodes
PE_PUKCodes
pukVal ProfileElement ::= pukCodes : {
-- PUK PE needs be right after the MF
puk-Header {
mandated NULL,
identification 2
},
pukCodes {
A33FA005 80008101 02A13630 11800101
81083132 33343536 37388202 0099300D
80010281 08313233 34353637 38301280
02008181 08313233 34353637 38820200
88
Securing the future of mobile services 21
Security, Identity, Mobility
{
keyReference pukAppl1,
pukValue ‘3132333435363738’H,
-- maxNumOfAttemps:9, retryNumLeft:9
maxNumOfAttemps-retryNumLeft 153
},
{
keyReference pukAppl2,
pukValue ‘3132333435363738’H
},
{
keyReference secondPUKAppl1,
pukValue ‘3132333435363738’H,
-- maxNumOfAttemps:8, retryNumLeft:8
maxNumOfAttemps-retryNumLeft 136
}
}
}
6.12.1.4. PE PINCodes
PE_PINCodes
pinVal ProfileElement ::= pinCodes : {
-- the PIN codes for global PINs have to be
created under the MF context and right after
the MF context
pin-Header {
mandated NULL,
identification 3
},
pinCodes pinconfig : {
{
keyReference pinAppl1,
pinValue ‘3132333435363738’H,
unblockingPINReference pukAppl1
},
{
keyReference pinAppl2,
pinValue ‘3132333435363738’H
},
{
keyReference adm1,
pinValue ‘3132333435363738’H
},
{
keyReference secondPINAppl1,
pinValue ‘3132333435363738’H,
-- PIN is enabled
pinAttributes 1,
-- maxNumOfAttemps:2, retryNumLeft:2
maxNumOfAttemps-retryNumLeft 34
}
}
}
A251A005 80008101 03A148A0 46301080
01018108 31323334 35363738 82010130
0D800102 81083132 33343536 3738300D
80010A81 08313233 34353637 38301480
02008181 08313233 34353637 38830101
840122
Securing the future of mobile services 22
Security, Identity, Mobility
6.12.1.5. PE USIM
PE_USIM
usimValue ProfileElement ::= usim : {
usim-header {
mandated NULL,
identification 10
},
templateID {2 23 143 1 2 4},
adf-usim {
fileDescriptor : {
fileID ‘7FF1’H,
dfName
‘A0000000871002FF33FF018900000100’H,
securityAttributesReferenced ‘2F0603’H
}
},
ef-imsi {
fileDescriptor {
securityAttributesReferenced ‘6F0602’H
},
fillFileContent ‘0832141049737856F6’H
},
ef-arr {
fileDescriptor {
fileDescriptor ‘4221002F0F’H,
-- reference to the #ACCESS_RULE10
securityAttributesReferenced ‘6F060A’H
}
fillFileContent
‘800102A4068301019501088401329700800118A406830
10A950108’H,
fillFileOffset 20,
fillFileContent
‘800101A40683010195010880011AA40683010A9501088
401329700’H,
fillFileOffset 20,
fillFileContent
‘80011BA40683010A9501088401329700’H,
fillFileOffset 31,
fillFileContent
‘800101900080011A97008401329700’H,
fillFileOffset 32,
fillFileContent
‘800103A4068301019501088401329700800118A406830
10A950108’H,
fillFileOffset 20,
fillFileContent
‘800111A4068301019501088401329700
80010AA40683010A950108’H,
fillFileOffset 20,
fillFileContent
‘800107A406830181950108800118A40683010A9501088
40132A406830101950108’H,
fillFileOffset 14,
fillFileContent
‘800101A406830101950108800102A406830102950108
8401329700’H,
fillFileOffset 20,
B3820203 A0058000 81010A81 0667810F
010204A2 1DA11B83 027FF184 10A00000
00871002 FF33FF01 89000001 008B032F
0603A312 A1058B03 6F060283 09083214
10497378 56F6A482 0167A10C 82054221
002F0F8B 036F060A 831B8001 02A40683
01019501 08840132 97008001 18A40683
010A9501 08820114 831B8001 01A40683
01019501 0880011A A4068301 0A950108
84013297 00820114 83108001 1BA40683
010A9501 08840132 97008201 1F830F80
01019000 80011A97 00840132 97008201
20831B80 0103A406 83010195 01088401
32970080 0118A406 83010A95 01088201
14831B80 0111A406 83010195 01088401
32970080 010AA406 83010A95 01088201
14832180 0107A406 83018195 01088001
18A40683 010A9501 08840132 A4068301
01950108 82010E83 1B800101 A4068301
01950108 800102A4 06830102 95010884
01329700 82011483 15800101 90008401
32970080 011AA406 83010195 01088201
1A831580 01019000 80011AA4 0683010A
95010884 01329700 82011A83 1A800101
90008001 18A40683 010A9501 08800102
97008401 32970082 01158315 800101A4
06830101 95010880 011A9700 84013297
00A816A1 058B036F 0602830D 0A2E178C
E7320400 00000000 00AD1AA1 058B036F
060A8311 0247534D 41206555 494343FF
FFFFFFFF FFAE0AA1 058B036F 06088301
00B20BA1 058B036F 06028302 0010B607
A1058B03 6F060A
Securing the future of mobile services 23
Security, Identity, Mobility
fillFileContent ‘80010190008401329700
80011AA406830101950108’H,
fillFileOffset 26,
fillFileContent
‘800101900080011AA40683010A9501088401329700’H,
fillFileOffset 26,
fillFileContent
‘8001019000800118A40683010A9501088001029700840
1329700’H,
fillFileOffset 21,
fillFileContent
‘800101A40683010195010880011A97008401329700’H
}
ef-ust {
fileDescriptor {
-- reference to the #ACCESS_RULE2
securityAttributesReferenced ‘6F0602’H
},
-- Service Dialling Numbers, Short Message
Storage…
fillFileContent
‘0A2E178CE73204000000000000’H
},
ef-spn {
fileDescriptor {
-- reference to the #ACCESS_RULE10
securityAttributesReferenced ‘6F060A’H
},
-- ASCII format: “GSMA eUICC”
fillFileContent
‘0247534D41206555494343FFFFFFFFFFFF’H
},
ef-est {
fileDescriptor {
-- reference to the #ACCESS_RULE8
securityAttributesReferenced ‘6F0608’H
},
-- Services deactivated
fillFileContent ‘00’H
},
ef-acc {
fileDescriptor {
-- reference to the #ACCESS_RULE2
securityAttributesReferenced ‘6F0602’H
},
-- Access class 4
fillFileContent ‘0010’H
},
ef-ecc {
fileDescriptor {
-- reference to the #ACCESS_RULE10
securityAttributesReferenced ‘6F060A’H
}
}
}
Securing the future of mobile services 24
Security, Identity, Mobility
6.12.1.6. PE PINCodes (Local PIN)
PE_Local_PIN_Value localPinValue ProfileElement ::= pinCodes : {
pin-Header {
mandated NULL,
identification 20
},
pinCodes pinconfig : {
{
keyReference secondPINAppl1,
pinValue ‘0101010101010101’H,
pinAttributes 1,
maxNumOfAttemps-retryNumLeft 34
}
}
}
A221A005 80008101 14A118A0 16301480
02008181 08010101 01010101 01830101
840122
6.12.1.7. PE AKA Parameter
PE_AKA_Parameters akaParameterValue ProfileElement ::=
akaParameter : {
aka-header {
identification 30
},
algorithmID milenage,
algorithmOptions ‘00’H,
algoConfiguration algoParameter : {
key ‘465B5CE8B199B49FAA5F0A2EE238A6BC’H,
opc ‘CD63CB71954A9F4E48A5994E37A02BAF’H,
rotationConstants ‘4000204060’H,
-- the length of the xoring constant has
been corrected to the value expected by the
millenage algorithm
xoringConstants
‘000000000000000000000000000000000000000000000
0000000000000000001000000000000000000000000000
0000200000000000000000000000000000004000000000
00000000000000000000008’H,
sqnInit {
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
A48185A0 0381011E 81010182 0100A378
A1768010 465B5CE8 B199B49F AA5F0A2E
E238A6BC 8110CD63 CB71954A 9F4E48A5
994E37A0 2BAF8350 00000000 00000000
00000000 00000000 00000000 00000000
00000000 00000001 00000000 00000000
00000000 00000002 00000000 00000000
00000000 00000004 00000000 00000000
00000000 00000008
Securing the future of mobile services 25
Security, Identity, Mobility
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H,
‘000000000000’H
}
},
sqnOptions ‘02’H,
sqnDelta ‘000010000000’H,
sqnAgeLimit ‘000010000000’H
}
6.12.1.8. PE SecurityDomain (MNO SD)
PE_SecurityDomain_MNO_SD
mnoSdValue ProfileElement ::= securityDomain :
{
sd-Header {
mandated NULL,
identification 40
},
instance {
applicationLoadPackageAID
‘A0000001515350’H,
classAID ‘A000000151535041’H,
instanceAID ‘A000000151000000’H,
applicationPrivileges ‘82FC80’H,
-- Secured
lifeCycleState ‘0F’H,
-- SCP80 supported acc. UICC Config.
applicationSpecificParametersC9
‘81028000’H,
-- other parameters may be necessary
applicationParameters {
-- TAR: B20100, MSL: 12
uiccToolkitApplicationSpecificParametersField
‘0100000100000002011203B2010000’H
}
},
keyList {
{
-- C-ENC + R-ENC
keyUsageQualifier ‘38’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- ENC key
keyIdentifier ‘01’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
scp80SeqCounter ‘00’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
A681D1A0 05800081 0128A13E 4F07A000
00015153 504F08A0 00000151 5350414F
08A00000 01510000 00820382 FC808301
0FC90481 028000EA 11800F01 00000100
00000201 1203B201 0000A281 87302D95
01389601 00820101 83010184 035689A3
04010030 17301580 01808610 11223344
55667788 99101112 13141516 302A9501
34960100 82010283 01018403 5689A330
17301580 01808610 11223344 55667788
99101112 13141516 302A9501 C8960100
82010383 01018403 5689A330 17301580
01808610 11223344 55667788 99101112
13141516
Securing the future of mobile services 26
Security, Identity, Mobility
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- C-MAC + R-MAC
keyUsageQualifier ‘34’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- MAC key
keyIdentifier ‘02’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- C-DEK + R-DEK
keyUsageQualifier ‘C8’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- data ENC key
keyIdentifier ‘03’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
}
}
}
6.12.1.9. PE Security Domain (SSD)
PE_SecurityDomain_SSD
ssdValue ProfileElement ::= securityDomain : {
sd-Header {
mandated NULL,
identification 41
},
instance {
applicationLoadPackageAID
‘A0000001515350’H,
classAID ‘A000000151535041’H,
instanceAID
‘A00000055910100102736456616C7565’H,
extraditeSecurityDomainAID
‘A000000151000000’H,
applicationPrivileges ‘808000’H,
lifeCycleState ‘0F’H,
applicationSpecificParametersC9
‘81028000’H,
applicationParameters {
A681E3A0 05800081 0129A150 4F07A000
00015153 504F08A0 00000151 5350414F
10A00000 05591010 01027364 56616C75
654F08A0 00000151 00000082 03808000
83010FC9 04810280 00EA1180 0F010000
01000000 02011203 6C756500 A2818730
2D950138 96010082 01018301 0184036F
B23E0401 00301730 15800180 86101122
33445566 77881122 33445566 7788302A
95013496 01008201 02830101 84036FB2
3E301730 15800180 86101122 33445566
77881122 33445566 7788302A 9501C896
01008201 03830101 84036FB2 3E301730
15800180 86101122 33445566 77881122
33445566 7788
Securing the future of mobile services 27
Security, Identity, Mobility
uiccToolkitApplicationSpecificParametersField
‘01000001000000020112036C756500’H
}
},
keyList {
{
keyUsageQualifier ‘38’H,
keyAccess ‘00’H,
keyIdentifier ‘01’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘6FB23E’H,
scp80SeqCounter ‘00’H,
keyCompontents {
{
keyType ‘80’H,
keyData
‘11223344556677881122334455667788’H
}
}
},
{
keyUsageQualifier ‘34’H,
keyAccess ‘00’H,
keyIdentifier ‘02’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘6FB23E’H,
keyCompontents {
{
keyType ‘80’H,
keyData
‘11223344556677881122334455667788’H
}
}
},
{
keyUsageQualifier ‘C8’H,
keyAccess ‘00’H,
keyIdentifier ‘03’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘6FB23E’H,
keyCompontents {
{
keyType ‘80’H,
keyData
‘11223344556677881122334455667788’H
}
}
}
}
}
Securing the future of mobile services 28
Security, Identity, Mobility
6.12.1.10. PE Application
PE_Application
appletValue ProfileElement ::= application : {
app-Header {
mandated NULL,
identification 50
},
loadBlock {
loadPackageAID ‘A000000559101001’H,
-- Java file for the applet1 in [GS RPAT
Annex A1]
loadBlockObject
‘01002EDECAFFED020204000108A0000005591010011B6
36F6D2F67736D612F65756963632F746573742F6170706
C657431020021002E0021000F003B002A00210066000A0
00E0000008A040F00000000000004010004003B0403010
7A0000000620101000110A0000000090005FFFFFFFF891
2000000010110A0000000871005FFFFFFFF89132000000
00107A000000062000103000F010BA0000005591010011
122330008060021000044800300FF00050400000033FFF
F003000408107008200008002008108010807006600011
0188C00007A04328F00013D8C00022E181D25290416046
1081B8B0003700C1B181D044116048B00041B8C00057A0
0207A02301E046B071967041877017702211D750016000
1000200098D00062D1A048E0200071770027A02108D000
8058E020009007A08000A0000000000000000000005002
A000A06800300010002000600000103800301038003020
600005A06810F0001810400068110000181090009000E0
000000A0506040E0C0420070905’H
},
instanceList {
{
applicationLoadPackageAID
‘A000000559101001’H,
classAID ‘A000000559101001112233’H,
instanceAID ‘A00000055910100111223301’H,
applicationPrivileges ‘000000’H,
-- Selectable
lifeCycleState ‘07’H,
applicationSpecificParametersC9 ‘00’H,
applicationParameters {
uiccToolkitApplicationSpecificParametersField
-- TAR: 112233
‘0100000000000311223300’H
}
}
}
}
A88201D9 A0058000 810132A1 82018B4F
08A00000 05591010 01C48201 7D01002E
DECAFFED 02020400 0108A000 00055910
10011B63 6F6D2F67 736D612F 65756963
632F7465 73742F61 70706C65 74310200
21002E00 21000F00 3B002A00 21006600
0A000E00 00008A04 0F000000 00000004
01000400 3B040301 07A00000 00620101
000110A0 00000009 0005FFFF FFFF8912
00000001 0110A000 00008710 05FFFFFF
FF891320 00000001 07A00000 00620001
03000F01 0BA00000 05591010 01112233
00080600 21000044 800300FF 00050400
000033FF FF003000 40810700 82000080
02008108 01080700 66000110 188C0000
7A04328F 00013D8C 00022E18 1D252904
16046108 1B8B0003 700C1B18 1D044116
048B0004 1B8C0005 7A00207A 02301E04
6B071967 04187701 7702211D 75001600
01000200 098D0006 2D1A048E 02000717
70027A02 108D0008 058E0200 09007A08
000A0000 00000000 00000000 05002A00
0A068003 00010002 00060000 01038003
01038003 02060000 5A06810F 00018104
00068110 00018109 0009000E 0000000A
0506040E 0C042007 0905A241 303F4F08
A0000005 59101001 4F0BA000 00055910
10011122 334F0CA0 00000559 10100111
22330182 03000000 830107C9 0100EA0D
800B0100 00000000 03112233 00
Securing the future of mobile services 29
Security, Identity, Mobility
6.12.1.11. PE RFM
PE_RFM
rfmValue ProfileElement ::= rfm : {
rfm-header {
mandated NULL,
identification 60
},
securityDomainAID ‘A000000151000000’H,
tarList {
‘B00010’H
},
minimumSecurityLevel ‘12’H,
uiccAccessDomain ‘00’H,
uiccAdminAccessDomain ‘00’H
}
A7213005 80008101 3C4F08A0 00000151
000000A0 050403B0 00108101 12040100
040100
6.12.1.12. PE End
PE_END
endValue ProfileElement ::= end : {
end-header {
mandated NULL,
identification 99
}
}
AA07A005 80008101 63
6.12.2 Customised PEs
The content of the Customised PEs is based on the content of the Basic Profile Package PEs and is modified
according to the testing needs.
6.12.2.1. PE Security Domain
6.12.2.1.1. PE SecurityDomain (MNO_SD1)
This PE provides only the mandatory objects a PE Security Domain has to contain.
Compared to the Basic Profile Package PE Security Domain definition defined in 6.12.1.8, all optional
definitions are removed.
PE_SecurityDomain_MNO_SD1
mnoSdValue ProfileElement ::= securityDomain :
{
sd-Header {
mandated NULL,
identification 3
},
instance {
applicationLoadPackageAID
‘A0000001515350’H,
A631A005 80008101 03A1284F 07A00000
01515350 4F08A000 00015153 50414F08
A0000001 51000000 820382FC 8083010F
C90100
Securing the future of mobile services 30
Security, Identity, Mobility
classAID ‘A000000151535041’H,
instanceAID ‘A000000151000000’H,
applicationPrivileges ‘82FC80’H,
-- Secured
lifeCycleState ‘0F’H,
-- no SCP defined
applicationSpecificParametersC9 ‘00’H,
}
}
6.12.2.1.2. PE SecurityDomain (MNO SD2)
Compared to the Basic Profile Package PE Security Domain definition defined in 6.12.1.8, the first key of the
keylist contains two key components definitions.
PE_ SecurityDomain_MNO_SD2
mnoSdValue ProfileElement ::= securityDomain :
{
sd-Header {
mandated NULL,
identification 40
},
instance {
applicationLoadPackageAID
‘A0000001515350’H,
classAID ‘A000000151535041’H,
instanceAID ‘A000000151000000’H,
applicationPrivileges ‘82FC80’H,
-- Secured
lifeCycleState ‘0F’H,
-- SCP80 supported acc. UICC Config.
applicationSpecificParametersC9
‘81028000’H,
-- other parameters may be necessary
applicationParameters {
-- TAR: B20100, MSL: 12
uiccToolkitApplicationSpecificParametersField
‘0100000100000002011203B2010000’H
}
},
keyList {
{
-- C-ENC + R-ENC
keyUsageQualifier ‘38’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- ENC key
keyIdentifier ‘01’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
scp80SeqCounter ‘00’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
},
{
-- DES mode implicitly known
A681EBA0 05800081 0128A13E 4F07A000
00015153 504F08A0 00000151 5350414F
08A00000 01510000 00820382 FC808301
0FC90481 028000EA 11800F01 00000100
00000201 1203B201 0000A281 A1304495
01389601 00820101 83010184 035689A3
04010030 2E301580 01808610 11223344
55667788 99101112 13141516 30158001
80861011 22334455 66778899 10111213
14151630 2D950134 96010082 01028301
01840356 89A30401 00301730 15800180
86101122 33445566 77889910 11121314
1516302A 9501C896 01008201 03830101
84035689 A3301730 15800180 86101122
33445566 77889910 11121314 1516
Securing the future of mobile services 31
Security, Identity, Mobility
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- C-MAC + R-MAC
keyUsageQualifier ‘34’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- MAC key
keyIdentifier ‘02’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
scp80SeqCounter ‘00’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- C-DEK + R-DEK
keyUsageQualifier ‘C8’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- data ENC key
keyIdentifier ‘03’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
}
}
}
6.12.2.1.3. PE SecurityDomain (MNO SD3)
Compared to the Basic Profile Package PE Security Domain definition defined in 6.12.1.8, the PE SD contains
the sdPerso Data definition.
PE_SecurityDomain_MNO_SD3
mnoSdValue ProfileElement ::= securityDomain :
{
sd-Header {
mandated NULL,
identification 40
},
instance {
applicationLoadPackageAID
‘A0000001515350’H,
classAID ‘A000000151535041’H,
A681EDA0 05800081 0128A13E 4F07A000
00015153 504F08A0 00000151 5350414F
08A00000 01510000 00820382 FC808301
0FC90481 028000EA 11800F01 00000100
00000201 1203B201 0000A281 87302D95
01389601 00820101 83010184 035689A3
04010030 17301580 01808610 11223344
55667788 99101112 13141516 302A9501
34960100 82010283 01018403 5689A330
Securing the future of mobile services 32
Security, Identity, Mobility
instanceAID ‘A000000151000000’H,
applicationPrivileges ‘82FC80’H,
-- Secured
lifeCycleState ‘0F’H,
-- SCP80 supported acc. UICC Config.
applicationSpecificParametersC9
‘81028000’H,
-- other parameters may be necessary
applicationParameters {
-- TAR: B20100, MSL: 12
uiccToolkitApplicationSpecificParametersField
‘0100000100000002011203B2010000’H
}
},
keyList {
{
-- C-ENC + R-ENC
keyUsageQualifier ‘38’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- ENC key
keyIdentifier ‘01’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
scp80SeqCounter ‘00’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- C-MAC + R-MAC
keyUsageQualifier ‘34’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- MAC key
keyIdentifier ‘02’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- C-DEK + R-DEK
keyUsageQualifier ‘C8’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- data ENC key
keyIdentifier ‘03’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
keyCompontents {
{
-- DES mode implicitly known
17301580 01808610 11223344 55667788
99101112 13141516 302A9501 C8960100
82010383 01018403 5689A330 17301580
01808610 11223344 55667788 99101112
13141516 A31A040B 00700842 06010203
04050604 0B007008 45060605 04030201
Securing the future of mobile services 33
Security, Identity, Mobility
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
}
},
-- IIN and CIN
sdPersoData {
‘0070084206010203040506’H,
‘0070084506060504030201’H
}
}
6.12.2.1.4. PE SecurityDomain (MNO SD4)
Compared to the Basic Profile Package PE Security Domain definition defined in 6.12.1.8, the instance
definition is extended by the processData definition containing HTTPs configuration data.
PE_SecurityDomain_MNO_SD4
mnoSdValue ProfileElement ::= securityDomain :
{
sd-Header {
mandated NULL,
identification 40
},
instance {
applicationLoadPackageAID
‘A0000001515350’H,
classAID ‘A000000151535041’H,
instanceAID ‘A000000151000000’H,
applicationPrivileges ‘82FC80’H,
-- Secured
lifeCycleState ‘0F’H,
-- SCP80 supported acc. UICC Config.
applicationSpecificParametersC9
‘8102800081028100’H,
-- other parameters may be necessary
applicationParameters {
-- TAR: B20100, MSL: 12
uiccToolkitApplicationSpecificParametersField
‘0100000100000002011203B2010000’H
},
-- HTTP Configuration according Amend.B
processData{
‘80E21000428581AB84243507020000030000023902057
8470947534D4165554943433C03021F413E05217F00000
1850A0650534B49443102400189778A096C6F63616C686
F7374’H,
‘80E290016C8B582F2F73652D69642F6569642F3030363
3363835363030303030303030303030303030303030303
030303737373B2F2F61612D69642F6169642F413030303
030303031382F343334443038303930413042304330303
03030308C102F67736D612F61646D696E6167656E74’H
}
},
keyList {
{
-- C-ENC + R-ENC
A68201D2 A0058000 810128A1 8201014F
07A00000 01515350 4F08A000 00015153
50414F08 A0000001 51000000 820382FC
8083010F C9088102 80008102 8100EA11
800F0100 00010000 00020112 03B20100
003081BC 044780E2 10004285 81AB8424
35070200 00030000 02390205 78470947
534D4165 55494343 3C03021F 413E0521
7F000001 850A0650 534B4944 31024001
89778A09 6C6F6361 6C686F73 74047180
E290016C 8B582F2F 73652D69 642F6569
642F3030 36333638 35363030 30303030
30303030 30303030 30303030 30303037
37373B2F 2F61612D 69642F61 69642F41
30303030 30303031 382F3433 34443038
30393041 30423043 30303030 30308C10
2F67736D 612F6164 6D696E61 67656E74
A281C330 2D950138 96010082 01018301
01840356 89A30401 00301730 15800180
86101122 33445566 77889910 11121314
1516302A 95013496 01008201 02830101
84035689 A3301730 15800180 86101122
33445566 77889910 11121314 1516302A
9501C896 01008201 03830101 84035689
A3301730 15800180 86101122 33445566
77889910 11121314 1516303A 95013C96
01008201 01830140 8403E42D 8A302730
25800185 8620F0C0 FAAC0EF1 364A3E5E
B4229CF7 97A3752C D0C82778 44576B3E
05D505A0 3F21A682 0191
Securing the future of mobile services 34
Security, Identity, Mobility
keyUsageQualifier ‘38’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- ENC key
keyIdentifier ‘01’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
scp80SeqCounter ‘00’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- C-MAC + R-MAC
keyUsageQualifier ‘34’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- MAC key
keyIdentifier ‘02’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- C-DEK + R-DEK
keyUsageQualifier ‘C8’H,
-- may be used by SD and application
keyAccess ‘00’H,
-- data ENC key
keyIdentifier ‘03’H,
keyVersionNumber ‘01’H,
keyCheckValue ‘5689A3’H,
keyCompontents {
{
-- DES mode implicitly known
keyType ‘80’H,
keyData
‘11223344556677889910111213141516’H
}
}
},
{
-- PSK
keyUsageQualifier '3C'H,
-- may be used by SD and application
keyAccess '00'H,
keyIdentifier '01'H,
keyVersionNumber '40'H,
keyCheckValue 'E42D8A'H,
keyCompontents {
{
Securing the future of mobile services 35
Security, Identity, Mobility
-- PSK
keyType '85'H,
keyData
'F0C0FAAC0EF1364A3E5EB4229CF797A3752CD0C827784
4576B3E05D505A03F21'H
}
}
}
}
}
Securing the future of mobile services 36
Security, Identity, Mobility
6.12.2.2. PE Application
6.12.2.2.1. void
6.12.2.2.2. PE Application 2
PE_APPLICATION_2
appletValue ProfileElement ::= application : {
app-Header {
mandated NULL,
identification 21
},
loadBlock {
loadPackageAID ‘A000000559101001’H,
securityDomainAID ‘A000000151000000’H
nonVolatileCodeLimitC6 ‘0000’H
volatileDataLimitC7 ‘FFFF’H
nonVolatileDataLimitC8 ‘0000’H
-- Java file for the applet1 in [GS RPAT
Annex A1]
loadBlockObject
‘01002EDECAFFED020204000108A0000005591010011B6
36F6D2F67736D612F65756963632F746573742F6170706
C657431020021002E0021000F003B002A00210066000A0
00E0000008A040F00000000000004010004003B0403010
7A0000000620101000110A0000000090005FFFFFFFF891
2000000010110A0000000871005FFFFFFFF89132000000
00107A000000062000103000F010BA0000005591010011
122330008060021000044800300FF00050400000033FFF
F003000408107008200008002008108010807006600011
0188C00007A04328F00013D8C00022E181D25290416046
1081B8B0003700C1B181D044116048B00041B8C00057A0
0207A02301E046B071967041877017702211D750016000
1000200098D00062D1A048E0200071770027A02108D000
8058E020009007A08000A0000000000000000000005002
A000A06800300010002000600000103800301038003020
600005A06810F0001810400068110000181090009000E0
000000A0506040E0C0420070905’H
},
instanceList {
{
applicationLoadPackageAID
‘A000000559101001’H,
classAID ‘A000000559101002112233’H,
instanceAID ‘A00000055910100211223301’H,
applicationPrivileges ‘000000’H,
lifeCycleState ‘07’H,
applicationSpecificParametersC9 ‘00’H,
applicationParameters {
uiccToolkitApplicationSpecificParametersField
‘0100000000000311223300’H
}
}
}
}
A88201EF A0058000 810115A1 8201A14F
08A00000 05591010 014F08A0 00000151
000000C6 020000C7 02FFFFC8 020000C4
82017D01 002EDECA FFED0202 04000108
A0000005 59101001 1B636F6D 2F67736D
612F6575 6963632F 74657374 2F617070
6C657431 02002100 2E002100 0F003B00
2A002100 66000A00 0E000000 8A040F00
00000000 00040100 04003B04 030107A0
00000062 01010001 10A00000 00090005
FFFFFFFF 89120000 00010110 A0000000
871005FF FFFFFF89 13200000 000107A0
00000062 00010300 0F010BA0 00000559
10100111 22330008 06002100 00448003
00FF0005 04000000 33FFFF00 30004081
07008200 00800200 81080108 07006600
0110188C 00007A04 328F0001 3D8C0002
2E181D25 29041604 61081B8B 0003700C
1B181D04 4116048B 00041B8C 00057A00
207A0230 1E046B07 19670418 77017702
211D7500 16000100 0200098D 00062D1A
048E0200 07177002 7A02108D 0008058E
02000900 7A08000A 00000000 00000000
00000500 2A000A06 80030001 00020006
00000103 80030103 80030206 00005A06
810F0001 81040006 81100001 81090009
000E0000 000A0506 040E0C04 20070905
A241303F 4F08A000 00055910 10014F0B
A0000005 59101002 1122334F 0CA00000
05591010 02112233 01820300 00008301
07C90100 EA0D800B 01000000 00000311
223300
Securing the future of mobile services 37
Security, Identity, Mobility
6.12.2.2.3. PE Application 3
PE_APPLICATION_3
appletValue ProfileElement ::= application : {
app-Header {
mandated NULL,
identification 22
},
loadBlock {
loadPackageAID ‘A000000559101001’H,
-- Java file for the applet1 in [GS RPAT
Annex A1]
loadBlockObject
‘01002EDECAFFED020204000108A0000005591010011B6
36F6D2F67736D612F65756963632F746573742F6170706
C657431020021002E0021000F003B002A00210066000A0
00E0000008A040F00000000000004010004003B0403010
7A0000000620101000110A0000000090005FFFFFFFF891
2000000010110A0000000871005FFFFFFFF89132000000
00107A000000062000103000F010BA0000005591010011
122330008060021000044800300FF00050400000033FFF
F003000408107008200008002008108010807006600011
0188C00007A04328F00013D8C00022E181D25290416046
1081B8B0003700C1B181D044116048B00041B8C00057A0
0207A02301E046B071967041877017702211D750016000
1000200098D00062D1A048E0200071770027A02108D000
8058E020009007A08000A0000000000000000000005002
A000A06800300010002000600000103800301038003020
600005A06810F0001810400068110000181090009000E0
000000A0506040E0C0420070905’H
},
instanceList {
{
applicationLoadPackageAID
‘A000000559101001’H,
classAID ‘A000000559101003112233’H,
instanceAID ‘A00000055910100113223301’H,
extraditeSecurityDomainAID
‘A000000151000000’H
applicationPrivileges ‘000000’H,
lifeCycleState ‘07’H,
applicationSpecificParametersC9 ‘00’H,
systemSpecificParameters {
volatileMemoryQuotaC7 ‘0000’H,
nonVolatileMemoryQuotaC8 ‘0000’H,
implicitSelectionParameter ‘CF0180’H,
volatileReservedMemory ‘D7020000’H,
nonVolatileReservedMemory ‘D8020000’H
},
applicationParameters {
uiccToolkitApplicationSpecificParametersField
‘0100000000000311223300’H,
uiccAccessParams ‘810400010000’H,
uiccAdministrativeAccessApplicationSpecificPar
ametersField ‘820400010000’H
}
}
}
}
A882020E A0058000 810116A1 82018B4F
08A00000 05591010 01C48201 7D01002E
DECAFFED 02020400 0108A000 00055910
10011B63 6F6D2F67 736D612F 65756963
632F7465 73742F61 70706C65 74310200
21002E00 21000F00 3B002A00 21006600
0A000E00 00008A04 0F000000 00000004
01000400 3B040301 07A00000 00620101
000110A0 00000009 0005FFFF FFFF8912
00000001 0110A000 00008710 05FFFFFF
FF891320 00000001 07A00000 00620001
03000F01 0BA00000 05591010 01112233
00080600 21000044 800300FF 00050400
000033FF FF003000 40810700 82000080
02008108 01080700 66000110 188C0000
7A04328F 00013D8C 00022E18 1D252904
16046108 1B8B0003 700C1B18 1D044116
048B0004 1B8C0005 7A00207A 02301E04
6B071967 04187701 7702211D 75001600
01000200 098D0006 2D1A048E 02000717
70027A02 108D0008 058E0200 09007A08
000A0000 00000000 00000000 05002A00
0A068003 00010002 00060000 01038003
01038003 02060000 5A06810F 00018104
00068110 00018109 0009000E 0000000A
0506040E 0C042007 0905A276 30744F08
A0000005 59101001 4F0BA000 00055910
10031122 334F0CA0 00000559 10100113
2233014F 08A00000 01510000 00820300
00008301 07C90100 EF19C702 0000C802
0000CF03 CF0180D7 04D70200 00D804D8
020000EA 1D800B01 00000000 00031122
33008106 81040001 00008206 82040001
0000
Securing the future of mobile services 38
Security, Identity, Mobility
6.12.2.2.4. PE Application 4
PE_APPLICATION_4
appletValue ProfileElement ::= application : {
app-Header {
mandated NULL,
identification 23
},
loadBlock {
loadPackageAID ‘A000000559101002’H,
-- Java file based on the applet1 in [GS
RPAT Annex A1 with AID modified]
loadBlockObject
‘01002EDECAFFED020204000108A0000005591010011B6
36F6D2F67736D612F65756963632F746573742F6170706
C657431020021002E0021000F003B002A00210066000A0
00E0000008A040F00000000000004010004003B0403010
7A0100000620101000110A0000000090005FFFFFFFF891
2000000010110A0000000871005FFFFFFFF89132000000
00107A000000062000103000F010BA0000005591010011
122330008060021000044800300FF00050400000033FFF
F003000408107008200008002008108010807006600011
0188C00007A04328F00013D8C00022E181D25290416046
1081B8B0003700C1B181D044116048B00041B8C00057A0
0207A02301E046B071967041877017702211D750016000
1000200098D00062D1A048E0200071770027A02108D000
8058E020009007A08000A0000000000000000000005002
A000A06800300010002000600000103800301038003020
600005A06810F0001810400068110000181090009000E0
000000A0506040E0C0420070905’H
}
}
A8820196 A0058000 810117A1 82018B4F
08A00000 05591010 01C48201 7D01002E
DECAFFED 02020400 0108A000 00055910
10011B63 6F6D2F67 736D612F 65756963
632F7465 73742F61 70706C65 74310200
21002E00 21000F00 3B002A00 21006600
0A000E00 00008A04 0F000000 00000004
01000400 3B040301 07A01000 00620101
000110A0 00000009 0005FFFF FFFF8912
00000001 0110A000 00008710 05FFFFFF
FF891320 00000001 07A00000 00620001
03000F01 0BA00000 05591010 01112233
00080600 21000044 800300FF 00050400
000033FF FF003000 40810700 82000080
02008108 01080700 66000110 188C0000
7A04328F 00013D8C 00022E18 1D252904
16046108 1B8B0003 700C1B18 1D044116
048B0004 1B8C0005 7A00207A 02301E04
6B071967 04187701 7702211D 75001600
01000200 098D0006 2D1A048E 02000717
70027A02 108D0008 058E0200 09007A08
000A0000 00000000 00000000 05002A00
0A068003 00010002 00060000 01038003
01038003 02060000 5A06810F 00018104
00068110 00018109 0009000E 0000000A
0506040E 0C042007 0905
Securing the future of mobile services 39
Security, Identity, Mobility
6.12.2.2.5. PE Application 5
PE_APPLICATION_5
appletValue ProfileElement ::= application : {
app-Header {
mandated NULL,
identification 24
},
loadBlock {
loadPackageAID ‘A000000559101001’H,
-- Java file for the applet1 in [GS RPAT
Annex A1]
loadBlockObject
‘01002EDECAFFED020204000108A0000005591010011B6
36F6D2F67736D612F65756963632F746573742F6170706
C657431020021002E0021000F003B002A00210066000A0
00E0000008A040F00000000000004010004003B0403010
7A0000000620101000110A0000000090005FFFFFFFF891
2000000010110A0000000871005FFFFFFFF89132000000
00107A000000062000103000F010BA0000005591010011
122330008060021000044800300FF00050400000033FFF
F003000408107008200008002008108010807006600011
0188C00007A04328F00013D8C00022E181D25290416046
1081B8B0003700C1B181D044116048B00041B8C00057A0
0207A02301E046B071967041877017702211D750016000
1000200098D00062D1A048E0200071770027A02108D000
8058E020009007A08000A0000000000000000000005002
A000A06800300010002000600000103800301038003020
600005A06810F0001810400068110000181090009000E0
000000A0506040E0C0420070905’H
},
instanceList {
{
applicationLoadPackageAID
‘A000000559101001’H,
classAID ‘A000000559101005445566’H,
instanceAID ‘A00000055910100544556601’H,
applicationPrivileges ‘000000’H,
lifeCycleState ‘07’H,
applicationSpecificParametersC9 ‘00’H
}
-- Second Instance
{
applicationLoadPackageAID
‘A000000559101001’H,
classAID ‘ A000000559101005445566’H,
instanceAID ‘A00000055910100511223302’H,
applicationPrivileges ‘000000’H,
lifeCycleState ‘07’H,
applicationSpecificParametersC9 ‘00’H
}
}
}
A88201FC A0058000 810118A1 82018B4F
08A00000 05591010 01C48201 7D01002E
DECAFFED 02020400 0108A000 00055910
10011B63 6F6D2F67 736D612F 65756963
632F7465 73742F61 70706C65 74310200
21002E00 21000F00 3B002A00 21006600
0A000E00 00008A04 0F000000 00000004
01000400 3B040301 07A00000 00620101
000110A0 00000009 0005FFFF FFFF8912
00000001 0110A000 00008710 05FFFFFF
FF891320 00000001 07A00000 00620001
03000F01 0BA00000 05591010 01112233
00080600 21000044 800300FF 00050400
000033FF FF003000 40810700 82000080
02008108 01080700 66000110 188C0000
7A04328F 00013D8C 00022E18 1D252904
16046108 1B8B0003 700C1B18 1D044116
048B0004 1B8C0005 7A00207A 02301E04
6B071967 04187701 7702211D 75001600
01000200 098D0006 2D1A048E 02000717
70027A02 108D0008 058E0200 09007A08
000A0000 00000000 00000000 05002A00
0A068003 00010002 00060000 01038003
01038003 02060000 5A06810F 00018104
00068110 00018109 0009000E 0000000A
0506040E 0C042007 0905A264 30304F08
A0000005 59101001 4F0BA000 00055910
10054455 664F0CA0 00000559 10100544
55660182 03000000 830107C9 01003030
4F08A000 00055910 10014F0B A0000005
59101005 4455664F 0CA00000 05591010
05112233 02820300 00008301 07C90100
Securing the future of mobile services 40
Security, Identity, Mobility
7. Profile Package General Structure
7.1 Test requirements The test requirements are extracted from sections 7.2 and 7.3 of “eUICC Profile Package: Interoperable
Format Technical Specification” [SA PP TS].
RQ7.1.1.1 Each PE is described and can be processed by the eUICC independently from the others.
RQ7.1.1.2 An identification number shall be associated to every PE.
RQ7.1.1.3 A PE starts with a header containing the following information:
PE identification number.
Optional flag indicating that the support of this PE is mandatory.
PE type.
PE length.
RQ7.1.1.4 If a feature in a PE flagged as mandatory is not supported by the eUICC:
an error is reported to the Profile Creator.
the processing of the Profile Package is cancelled.
and all of the PE already processed shall be discarded.
RQ7.1.1.5 If a PE is not flagged as mandatory, and if the eUICC does not support the associated feature, the error is reported but the processing of the Profile Package continues.
RQ7.1.1.6 In order to avoid errors and warnings during the processing of a Profile Package, the Profile Creator may audit the targeted eUICC before building a Profile Package. In that case, all the features described in the Profile Package will be entirely supported by the eUICC.
RQ7.1.1.7 The features that shall be supported by the Profile are also described in the Profile header. In case the eUICC does not support one of the features listed in this Profile header, the eUICC shall immediately return an error code and abort the processing of the Profile.
NOTE: RQ7.1.1.1, RQ7.1.1.2 and RQ7.1.1.3 are implicitely tested in test cases loading profiles NOTE 2: Testing of RQ7.1.1.4, RQ7.1.1.5, RQ7.1.1.6 and RQ7.1.1.7 is FFS.
7.2 Test cases / scenarios FFS.
Securing the future of mobile services 41
Security, Identity, Mobility
8. Profile Package Elements Definition
8.1 Test requirements
8.1.1 Common types
The test requirements are extracted from section 8.1 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
Securing the future of mobile services 42
Security, Identity, Mobility
RQ8.1.1.1 The Profile Package shall respect the size constaints 0 to 255 for the basic integer type Uint8.
RQ8.1.1.2 The Profile Package shall respect the size constaints 0 to 32267 for the basic integer type Uint15.
RQ8.1.1.3 The Profile Package shall respect the size constaints 0 to 65535 for the basic integer type Uint16.
RQ8.1.1.4 The Profile Package shall respect the size constaints 0 to 2147483647 for the basic integer type Uint31.
RQ8.1.1.5 The Application Identifier (AID) shall be an OCTET STRING with the size of 5 to 16 bytes.
RQ8.1.1.6 The PE Header shall be present at the beginning of all PE-s described in this specification.
RQ8.1.1.7 The PE Header may consist of an optional “mandated” field. The type of the mandated field shall be NULL.
RQ8.1.1.8 If the mandated field is set the support of this PE is mandatory for the installation of this Profile. If the eUICC does not support the following PE, it shall abort the processing of the profile and return an error to the sender of the profile.
RQ8.1.1.9 The PE Header shall consist of an “identification” field. The type of the identification field shall be Uint15.
RQ8.1.1.10 The identification field is used to uniquely identify the PE within a profile. It will be used for error reporting to the sender of the profile.
RQ8.1.1.11 Void
RQ8.1.1.12 The ProfileHeader shall be the first element and provided once within a profile download only.
RQ8.1.1.13 After the ProfileHeader, the file system shall be created, staring with the MF. The MF may be created using the file manager or the PE template. See NOTE 2.
RQ8.1.1.14 The PE-CD is optional and shall come after the creation of the MF.
RQ8.1.1.15 The PE-TELEKOM is optional and shall come after the creation of the MF.
RQ8.1.1.16 The PE-USIM is optional and shall come after the creation of the MF.
RQ8.1.1.17 The PE-ISIM is optional and shall come after the creation of the MF.
RQ8.1.1.18 The PE-CSIM is optional and shall come after the creation of the MF.
RQ8.1.1.19 The PE-OPT-USIM is optional and shall come after the PE-USIM.
RQ8.1.1.20 The PE-GSM-ACCESS is optional and shall come after the PE-USIM.
RQ8.1.1.21 The PE-PHONENOOK is optional and shall come after the PE-USIM.
RQ8.1.1.22 The PE-OPT-ISIM is optional and shall come after the PE-ISIM.
RQ8.1.1.23 The PE-OPT-CSIM is optional and shall come after the PE-CSIM.
RQ8.1.1.24 void
RQ8.1.1.25 PE-PINCodes shall be created in the context where they shall be defined.
RQ8.1.1.26 Global PINs shall be created in the context of the creation of the UICC file system (MF).
RQ8.1.1.27 PE-PINCodes shall only be provided once within each DF (ADF).
RQ8.1.1.28 For milenage or Tuak, PE-AKAParameters shall be created once in the context of the respective NAA.
RQ8.1.1.29 PE-AKAParameters shall only be provided once per NAA.
RQ8.1.1.30 PE-AKAParameters is not allowed in the context of MF.
RQ8.1.1.31 PE-AKAParameters is not allowed in the context of SDs.
RQ8.1.1.32 PE-AKAParameters is not allowed in the context of applications.
RQ8.1.1.33 PE-PUKCodes shall only be provided once within the context of the UICC file system (MF).
RQ8.1.1.34 PE-PUKCodes shall include all PUK codes for the complete profile.
RQ8.1.1.35 PE-SecurityDomain is optional and shall be provided after the creation of the file system, NAA parameters and PIN/PUK configuration.
RQ8.1.1.36 PE-Application is optional and should be provided after the creation of the SDs.
RQ8.1.1.37 PE-RFM is optional. It shall be provided after the creation of the SDs the RFM parameters shall be assigned to.
RQ8.1.1.38 PE-NonStandard is optional and in general may be provided in any position after the profile header. Further restrictions depend on the respective application.
RQ8.1.1.39 PE-End shall be provided once at the end of the Profile Package.
NOTE: RQ8.1.1.10 and RQ8.1.1.38 are not testable. NOTE 2: RQ8.1.1.13 may not be testable according to version 1 of the core specification. It is testable if we consider the options are valid. NOTE 3: Requirements RQ8.1.1.1, RQ8.1.1.2, RQ8.1.1.3 and RQ8.1.1.5 are implicitly tested in test cases loading profiles. NOTE 4: RQ8.1.1.4 is not tested as basic integer type Uint31 is never used. NOTE 5: testing of RQ8.1.1.17, RQ8.1.1.18, RQ8.1.1.22 and RQ8.1.1.23 is FFS (ISIM and CSIM related) NOTE 6: testing of RQ8.1.1.30, RQ8.1.1.31 and RQ8.1.1.32 is FFS (not nominal tests) NOTE 7: RQ8.1.1.35 is implicitly tested every time a PE-SecurityDomain is used in test cases NOTE 8: Testing of RQ8.1.1.14, RQ8.1.1.15, RQ8.1.1.19, RQ8.1.1.20 and RQ8.1.1.21 is FFS.
Securing the future of mobile services 43
Security, Identity, Mobility
8.1.2 Profile header
The test requirements are extracted from section 8.2 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
RQ8.1.2.1 The ProfileHeader PE shall be used once and shall be the first PE of the Profile Package.
RQ8.1.2.2 The ServiceList type is used to indicate the services that shall be supported by the eUICC. The type of the fields in the ServiceList shall be NULL.
RQ8.1.2.3 The following list gives the features that the eUICC shall support in order to provide the associated service. When a service is present in the sequence, it indicates that this service is mandatory.
Service Feature provided by te eUICC
contactless support the SWP and HCI interfaces as well as the associated APIs.
usim the USIM application as defined by 3GPP [USIM].
isim the ISIM application as defined by 3GPP [ISIM].
csim the CSIM application as defined by 3GPP2 [CSIM].
milenage the milenage AKA authentication algorithm.
tuak the TUAK AKA authentication algorithm.
cave the CAVE authentication algorithm.
gba-usim support of GBA authentication context in the USIM application.
gba-isim support of GBA authentication context in the ISIM application.
mbms support of the MBMS authentication context in the USIM application.
eap support of the UICC EAP client.
javacard support of the Java Card TM runtime environment.
multos support of the Multos TM runtime environment.
RQ8.1.2.4 The ProfileHeader shall contain the “major-version”. The type of the major-version shall be Uint8.
RQ8.1.2.5 When receiving the ProfileHeader, the eUICC shall check the major-version. If the version indicated by the Profile is greater than the version supported by the eUICC, the eUICC shall return an error “unsupported-profile-version” and stop the processing of the Profile.
RQ8.1.2.6 The ProfileHeader shall contain the “minor-version”. The type of the minor-version shall be Uint8.
RQ8.1.2.7 The minor-version is only informative. It may indicate that the profile contains elements that the eUICC will not be able to process if it supports an older version of the specification. In that case, these elements shall be ignored by the eUICC unless they are marked as mandatory in the PE header.
RQ8.1.2.8 The ProfileHeader may contain the “profileType”. The type of the profileType shall be UTF8String. The “profileType” is a free optional text indicating for example, the name of the Profile issuer and the type of Profile.
RQ8.1.2.9 The ProfileHeader shall contain the “iccid”. The type of iccid shall be OCTET STRING (SIZE (10)).
RQ8.1.2.10 The ProfileHeader may contain the “pol”. The type of the pol shall be OCTET STRING. The pol contains the policy rules within a Profile.
RQ8.1.2.11 If pol is not supplied in the Profile Package, its value shall be set to all 0 in the eUICC.
RQ8.1.2.12 The ProfileHeader shall contain the “eUICC-Mandatory-services”. The type of the eUICC-Mandatory-services shall be ServiceList.
RQ8.1.2.13 The ProfileHeader shall contain the “eUICC-Mandatory-GFSTEList”.
RQ8.1.2.14 The “eUICC-Mandatory-GFSTEList” contains a list of OIDs identifying file system templates used in the Profile Package that shall be supported by the eUICC in order for the Profile to be correctly installed on the eUICC.
RQ8.1.2.15 This list may contain the OIDs associated to the file system template defined in “ANNEX A (Normative): File Structure Templates Definition” of this specification.
NOTE 1: RQ8.1.2.5 and RQ8.1.2.7 are FFS (only major version 1 up to now, and no minor). NOTE 2: RQ8.1.2.10 and RQ8.1.2.11 are not testable (there is no interoperable command to read the value). NOTE 3: RQ8.1.2.13 is implicitely tested everytime ProfileHeader is used.
8.1.3 File system
The test requirements are extracted from section 8.3 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
Securing the future of mobile services 44
Security, Identity, Mobility
RQ8.1.3.1 Templates need to be created according to the specified settings considering the mandatory parameters
(where no default is provided in the template).
RQ8.1.3.2 Templates can be sent in any order considering the dependencies (e.g. some templates require that a NAA has already been created).
RQ8.1.3.3 Parameters which alter the default given in a template needs to result in the desired configuration; e.g. change of file size, access rule reference.
RQ8.1.3.4 In case a file within a template is specified as ‘do not create’ it must not be available within the created file system.
RQ8.1.3.5 It shall be possible to mix templates with Generic FileSystem Commands.
RQ8.1.3.6 It shall be possible to create a complete profile by Generic FileSystem Commands without use of any templates.
RQ8.1.3.7 Using a template marked as mandated but which is not supported by the eUICC shall lead to an error.
RQ8.1.3.8 The eUICC shall support any template it claims to support; e.g the profile header is passed which requires the need for specific templates creation of the template shall work provided it is correctly used.
RQ8.1.3.9 It shall be possible to create multiple instances of the following templates: - USIM - ISIM - CSIM - EAP-AKA
RQ8.1.3.10 Templates shall always be created within the current context. E.g. the optional USIM EFs template shall be created in the currently selected application.
RQ8.1.3.11 The eUICC shall be able to create multiple instances of a file from a template by following the process described in figure 2 of the core specification [reference to add].
RQ8.1.3.12 It shall not be possible to create two files with the same file path irrespective of whether templates or a generic file system is used.
RQ8.1.3.13 void
RQ8.1.3.14 The eUICC shall be able to handle the “template modification rules” described within the specification; e.g. turn a file into a link.
RQ8.1.3.15 File content provided within the profile package shall be applied to the created file.
RQ8.1.3.16 Within an optional template, files shall only be created if the respective TLV is explicitly included in the profile package.
RQ8.1.3.17 For mandatory file templates all files shall be created unless they are explicitly marked as “do not create”.
RQ8.1.3.18 For all files which are not fully defined in the template specification (open parameters like size) the respective parameters shall be included in the profile package.
RQ8.1.3.19 FCP of files which have been created may include proprietary information. These parameters shall be ignored when checking the settings of files which have been created.
RQ8.1.3.20 The access conditions which have been configured shall apply for the respective files; e.g.: Never shall always be Never and not readable even if other PINs are verified; in case PIN1 is specified for read it shall only be possible to read the file if PIN1 has been verified; … The eUICC shall apply all provided FCP parameters according to ETSI TS 102 221 [102 221].
RQ8.1.3.21 The eUICC shall support access rule conditions according to the UICC specification ETSI TS 102 221 [102 221]; also supporting AND/OR conditions like PIN1 || ADM1.
NOTE: RQ8.1.3.1 and RQ8.1.3.19 are out of scope of this specification. NOTE 2: Testing of RQ8.1.3.2, RQ8.1.3.3, RQ8.1.3.4, RQ8.1.3.5, RQ8.1.3.6, RQ8.1.3.7, RQ8.1.3.9 RQ8.1.3.10, RQ8.1.3.11, RQ8.1.3.12, RQ8.1.3.14, RQ8.1.3.16, RQ8.1.3.17, RQ8.1.3.18, RQ8.1.3.20 and RQ8.1.3.21 is FFS. NOTE 3: RQ8.1.3.8 and RQ8.1.3.15 are implicitely tested in all test cases.
8.1.4 NAA(s)
The test requirements are extracted from section 8.4 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
Securing the future of mobile services 45
Security, Identity, Mobility
RQ8.1.4.1 The PE-AKAParameters shall be tested with the USIM and ISIM NAA.
RQ8.1.4.2 PE-AKAParameters shall be tested using both options: milenage and TUAK.
RQ8.1.4.3 For milenage PE-AKAParameters shall be tested with the following parameters: key: 16 byte length opc: 16 byte length RES Length Options: 32bits, 64bits, 128bits MAC-A, MAC-C Size: does not apply. To be set to 0 (64 bit) CK and IK size: 128 bits Rotation constants shall have a length of 5 bytes xoringConstants shall have a length of 80 Bytes. note: length of xoringConstants is incorrect within core specification and has been corrected here.
RQ8.1.4.4 For testing milenage the test vectors from 3GPP [MILENAGE] shall be used: PE-AKAParameters shall be initialised with the respective settings.
RQ8.1.4.5 For testing TUAK the test vectors from 3GPP [TUAK] shall be used: PE-AKAParameters shall be initialised with the respective settings.
RQ8.1.4.6 Using Authenticate within USIM NAA in 2G Compatibility mode shall only work if service 38 within the UST is enabled.
RQ8.1.4.7 Authenticate command shall only work if respective Application PIN for the NAA has been verified (e.g. PIN1).
RQ8.1.4.8 Sharing network credentials via the mapping function shall be tested between USIM NAAs, ISIM NAAs and USIM/ISIM. Same algorithm for both NAAs is to be anticipated. The following mapping permutations shall be tested:
- Algo milenage: Share Key, Opc, rotationConstants, xoringConstants algorithmOptions; All SQN parameters including SQN.
- Algo milenage: Share Key, Opc, rotationConstants, xoringConstants algorithmOptions, All SQN parameters excluding SQN.
- Algo TUAK: Share Key, TOPc algorithmOptions, All SQN parameters excluding SQN. - Algo TUAK: Share Key, TOPc algorithmOptions, All SQN parameters including SQN.
Note; Not sharing algorithmOptions, Key, (T)Opc is not possible due to a limitation in the specification. This option is subject to an open CR.
RQ8.1.4.9 DEFAULT values shall be verified by the relevant test to ensure that they are set correctly.
RQ8.1.4.10 It shall be tested if the DEFAULT values can be overwritten by the profile package; it shall also be checked that the DEFAULT values can be provided as well.
RQ8.1.4.11 Values for rotationConstants and xoringConstants shall only be provided in case milenage is used.
RQ8.1.4.12 SQN handling shall be tested with the available options: - Authentication shall not work for blocked SQN when the wrap around option deactivated. - If incoming SQN is out of range (depends on delta and age limit) the eUICC shall indicate the
need for resynchronization – provided the authentication vector passes authentication. - Authentication shall work if SQN is within the desired range (considering Delta and Age limit).
Note: SQN wrap around is not specified within the core specification > CR due.
RQ8.1.4.13 Testing of authCounterMax is not possible because of unclear behaviour. Note: CR pending to remove this feature from PE-AKAParameters.
RQ8.1.4.14 The PE-AKAParameters shall be send once per NAA.
NOTE : Testing of all RQs in this sections is FFS (priority for phase 2).
8.1.5 PIN and PUK codes
The test requirements are extracted from section 8.5 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
Securing the future of mobile services 46
Security, Identity, Mobility
RQ8.1.5.1 Global PINs created by the GlobalPIN PE shall be valid within the complete FileSystem.
RQ8.1.5.2 Local PINs shall only be valid within the context (DF and sub DFs) where they are defined.
RQ8.1.5.3 Remaining attempts / default counter shall be verified.
RQ8.1.5.4 Local PINs shared shall share remaining attempts in both contexts where they are valid.
RQ8.1.5.5 It shall be possible to create Global PINs in the context of the MF. E.g. after creation of the MF or also after selection of the MF using Generic File System.
RQ8.1.5.6 A PIN which is used but not defined shall be considered as a blocked PIN.
RQ8.1.5.7 It shall be possible to share one PUK for multiple PIN values.
RQ8.1.5.8 Blocked PINs cannot be verified via I/O but applets with the respective access rights may execute the authorised commands (update, read, create, delete, …)
RQ8.1.5.9 Within the FCP of the ADF and the MF the eUICC has to indicate the status of the PINs/PUKs as specified within the template (e.g. remaining attempts, PINs initialised, PINs available, PIN activated/deactivated) provided that the settings have not been altered after profile installation.
RQ8.1.5.10 The eUICC needs to support the PIN attributes specified: - PINs enabled: in this case the PIN shall be enabled. - PIN may be changed: PIN change allowed; otherwise not. - PIN can be disabled: Means that status of the PIN may not be altered.
- disabled PIN may not be enabled. - enabled PIN may not be disabled.
RQ8.1.5.11 It shall be possible to create all possible global PINs within the global PIN PE and respective PUK values.
RQ8.1.5.12 It shall be possible to create all second Application PINs within one or more DFs.
RQ8.1.5.13 Two local PINs which have been created separately in two DFs with the same second application PIN ID shall have separate status; own remaining attempts; own verified status; own enabled/disable status; also different attributes may be applied for the two PINs.
RQ8.1.5.14 PIN Values shall have a length of 8 Bytes. Unused Bytes are to be padded with FF..FF.
RQ8.1.5.15 It shall be possible to define any value for any PIN: Random Hex Values and also coded as string for user PINs (e.g. PIN 1234 > 31 32 33 34 FF FF FF FF).
RQ8.1.5.16 It shall be possible to assign a PUK value for any PIN.
RQ8.1.5.17 maxNumOfAttemps-retryNumLeft: It shall be possible to assign any value from 0…F for maxNumberOfAttempts and retryNumLeft independent from each other.
RQ8.1.5.18 It shall be possible to create any PIN in enabled or disabled mode.
RQ8.1.5.19 It shall be possible to create any PIN with “PIN can be disabled” stated to define that a PIN status cannot be changed from enabled to disabled and vice versa.
RQ8.1.5.20 It shall be possible to define any PIN with “PIN can be changed” set to allow changing the PIN value; if “PIN can be changed” is not set it shall not be possible to change the PIN.
NOTE: Testing of these RQs is FFS.
8.1.6 Security domains
The test requirements are extracted from section 8.6 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
Securing the future of mobile services 47
Security, Identity, Mobility
RQ8.1.6.1 The PE Security Domain shall consist of a PE header and an Application Instance object.
RQ8.1.6.2 The values standardised for Supplementary SDs shall be used for the Application Instance object.
RQ8.1.6.3 The PE Security Domain may consist of a keylist and sdPersoData objects.
RQ8.1.6.4 The PE-SecurityDomain shall be used for every SD creation, starting from MNO-SD.
RQ8.1.6.5 The MNO-SD shall be defined and created explicitly.
RQ8.1.6.6 The MNO-SD shall be created first before any other SD, before any RFM Parameters are set, or before any applets are created.
RQ8.1.6.7 Since no package AID nor classAID is standardised for the MNO-SD, it shall use the values defined for supplementary SD creation.
RQ8.1.6.8 The first SD within the sequence of the Profile Package shall be categorised as the MNO-SD by definition.
RQ8.1.6.9 The MNO-SD shall be installed with the special MNO-SD rights defined by the GSMA.
RQ8.1.6.10 All subsequent following instances of SDs shall be installed like regular supplementary SDs as known from GlobalPlatform Card Specification [GP CS].
RQ8.1.6.11 The keylist optional present in the Security Domain PE shall be a sequence of key objects.
RQ8.1.6.12 A key object shall contain a keyUsageQualifier, tag number [21] which shall be an OCTET STRING with SIZE of 1.
RQ8.1.6.13 A key object shall contain a keyAccess, tag number [22] which shall be an OCTET STRING with SIZE of 1.
RQ8.1.6.14 A key object shall contain a keyIdentifier, tag number [2] which shall be an OCTET STRING with SIZE of 1.
RQ8.1.6.15 A key object shall contain a keyVersionNumber, tag number [3] which shall be an OCTET STRING with SIZE of 1.
RQ8.1.6.16 A key object shall contain a list of keyComponents.
RQ8.1.6.17 A keyComponent shall contain a keytype, tag number [0], which shall be an OCTET STRING.
RQ8.1.6.18 A keyComponent shall contain a keyData which shall be an OCTET STRING.
RQ8.1.6.19 A key object may contain a keyCheckValue, tag number [4] which shall be an OCTET STRING
RQ8.1.6.20 A key object may contain a keyCounterValue, tag number [5] which shall be an OCTET STRING.
RQ8.1.6.21 A key object may contain a scp80SeqCounter which shall be an OCTET STRING.
RQ8.1.6.22 Each key to be personalised shall be listed only once.
RQ8.1.6.23 The optional keyCheckValue shall be checked in case it is available. If the check fails, the PE-SecurityDomain installation fails.
RQ8.1.6.24 The keyCheckValue may only be provided for key types supporting it.
RQ8.1.6.25 Scp80SeqCounter shall be defined only once for a complete key set.
RQ8.1.6.26 Only keyTypes defined in GlobalPlatform Card Specification [GP CS], Table 11-16, may be part of the list of keyComponents.
RQ8.1.6.27 Each keyComponent shall be specified only once per key (e.g. including two times the same keyType within one KeyObject will lead to an error).
RQ8.1.6.28 In case the sdPersoData is present it shall contain the data field of a STORE DATA command used to personalise the SD.
RQ8.1.6.29 The content of the data field of the STORE DATA command shall not be encrypted and shall use DGI format.
RQ8.1.6.30 The complete DGI structure for the SD personalisation shall be sent in one complete byte array.
RQ8.1.6.31 Each DGI shall be provided in its own sdPersoData record.
RQ8.1.6.32 Only standardised DGIs, according to GlobalPlatform Card Specification [GP CS], shall be sent when addressing a SD.
RQ8.1.6.33 Installation of the CASD, if required inside a Profile, shall use the same personalisation procedure as defined for SDs.
RQ8.1.6.34 In case RAM and OTA HTTPs is added to a SD the settings can be configured according to GlobalPlatform Card Specification [GP CS] and ETSI specifications.
RQ8.1.6.35 In case RAM is be added to a SD the TAR values for RAM can be configured as follows: - Bytes 13-15 of the SD instance AID. - TAR List within SD install parameters.
RQ8.1.6.36 In case OTA HTTPS is added to a SD OTA HTTPs may be provided within the processData in tag ‘85’ according to GlobalPlatform Amd B [GP AB] (Section 3.7.1 TLV: Security Domain Administration Session Parameters) in the ApplicationInstance structure.
RQ8.1.6.37 In case RAM is added to a SD The security level for RAM shall be defined by the MSL parameter of the SD installation parameters.
RQ8.1.6.38 In case RAM is added to a SD “00 00 00” should be assigned as the TAR value for RAM within the MNO-SD installation.
RQ8.1.6.39 The configuration of the PoR (Proof of Receipt) handling shall not be part of the Profile definition.
RQ8.1.6.40 The eUICC shall follow the latest ETSI and 3GPP release to provide the necessary level of security.
Securing the future of mobile services 48
Security, Identity, Mobility
NOTE: RQ8.1.6.9 is not tested in this specification. Its verification is under the scope of the GSMA. NOTE 2: testing of RQ8.1.6.20 and RQ8.1.6.33 is FFS. NOTE 3: RQ8.1.6.24 and RQ8.1.6.39 are not testable. NOTE 4: RQ8.1.6.32 is not tested in this specification. Its verification is under the scope of GlobalPlatform. NOTE 5: RQ8.1.6.40 is out of scope of this specification.
8.1.7 Application loading and installation
The test requirements are extracted from section 8.7 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
Securing the future of mobile services 49
Security, Identity, Mobility
RQ8.1.7.1 A library shall be loaded when only a ApplicationLoadPackage object is provided within one Application PE.
RQ8.1.7.2 A preloaded application shall be installed only when an ApplicationInstance object is provided within one Application PE.
RQ8.1.7.3 Multiple instances of the same application shall be installed when multiple ApplicationInstance objects are provided within one Application PE.
RQ8.1.7.4 An application shall be loaded providing an ApplicationLoadPackage object and installed via an
ApplicationInstance.
RQ8.1.7.5 An application shall be installed when an ApplicationInstance object is provided within one Application PE.
RQ8.1.7.6 If PEHeader object is set to mandatory, profile installation shall fail if one of the subsequent elements cannot be executed (e.g. load fails because of API incompatibility, install fails because of duplicate TAR values …).
RQ8.1.7.7 If PEHeader object is not set to mandatory, profile installation shall continue with the next PE if one of the subsequent elements cannot be executed (e.g. load fails because of API incompatibility, install fails because of duplicate TAR values …).
RQ8.1.7.8 The loadPackageAID object shall be based on the GP2.2 Load Command according to GlobalPlatform Card Specification [GP CS].
RQ8.1.7.9 The loadPackageAID object is mandatory and shall be an ApplicationIdentifier.
RQ8.1.7.10 The securityDomainAID object shall be based on the GP2.2 Load Command according to GlobalPlatform Card Specification [GP CS].
RQ8.1.7.11 The securityDomainAID object is optional and shall be an ApplicationIdentifier.
RQ8.1.7.12 The nonVolatileCodeLimitC6 object shall be based on the GP2.2 Load Command according to GlobalPlatform Card Specification [GP CS].
RQ8.1.7.13 The nonVolatileCodeLimitC6 object is optional and it shall be an OCTET STRING.
RQ8.1.7.14 The volatileDataLimitC7 object shall be based on the GP2.2 Load Command according to GlobalPlatform Card Specification [GP CS].
RQ8.1.7.15 The volatileDataLimitC7 object is optional and it shall be an OCTET STRING.
RQ8.1.7.16 The nonVolatileDataLimitC8 object shall be based on the GP2.2 Load Command according to GlobalPlatform Card Specification [GP CS]
RQ8.1.7.17 The nonVolatileDataLimitC8 object is optional and it shall be an OCTET STRING.
RQ8.1.7.18 The hashValue object shall be based on the GP2.2 Load Command according to GlobalPlatform Card Specification [GP CS]
RQ8.1.7.19 The hashValue object is optional and it shall be an OCTET STRING.
RQ8.1.7.20 The loadBlockObject object shall contain the complete load block.
RQ8.1.7.21 The loadBlockObject object is mandatory and it shall be an OCTET STRING.
RQ8.1.7.22 The coding of applicationLoadPackageAID object shall follow the coding defined for Install for Install defined by GlobalPlatform Card Specification [GP CS].
RQ8.1.7.23 The applicationLoadPackageAID object is mandatory and shall be an ApplicationIdentifier.
RQ8.1.7.24 The coding of classAID object shall follow the coding defined for Install for Install defined by GlobalPlatform Card Specification [GP CS].
RQ8.1.7.25 The classAID object is mandatory and shall be an ApplicationIdentifier.
RQ8.1.7.26 The coding of instanceAID object shall follow the coding defined for Install for Install defined by GlobalPlatform Card Specification [GP CS].
RQ8.1.7.27 The instanceAID object is mandatory and shall be an ApplicationIdentifier.
RQ8.1.7.28 The extraditeSecurityDomainAID object shall have the same effect like the Install for Extradition command defined by GlobalPlatform Card Specification [GP CS].
RQ8.1.7.29 The extraditeSecurityDomainAID object is optional and shall be an ApplicationIdentifier.
RQ8.1.7.30 If the extraditeSecurityDomainAID object value is not provided, the instance shall be associated to the MNO-SD by default.
RQ8.1.7.31 The coding of applicationPrivileges object shall follow the coding defined for Install for Install defined by GlobalPlatform Card Specification [GP CS].
RQ8.1.7.32 The applicationPrivileges object is mandatory and it shall be an OCTET STRING.
RQ8.1.7.33 The coding of lifeCycleState object shall follow the coding Life Cycle State defined within GlobalPlatform Card Specification [GP CS] (section 11.1.1 Life Cycle Coding).
RQ8.1.7.34 The lifeCycleState object is optional for the profile package and it shall be an OCTET STRING. If not provided the default value ‘03’H shall be taken into account as if provided.
RQ8.1.7.35 The coding of applicationSpecificParametersC9 object shall follow the coding defined for Install for Install defined by GlobalPlatform Card Specification [GP CS].
RQ8.1.7.36 The applicationSpecificParametersC9 object is mandatory and it shall be an OCTET STRING.
RQ8.1.7.37 The coding of systemSpecificParameters object shall follow the coding defined for Install for Install defined by GlobalPlatform Card Specification [GP CS].
Securing the future of mobile services 50
Security, Identity, Mobility
RQ8.1.7.38 The systemSpecificParameters object is optional and it shall be an ApplicationSystemParameters.
RQ8.1.7.39 The coding of applicationParameters object shall follow the coding defined in ETSI TS 102 226 [102 226].
RQ8.1.7.40 The applicationParameters object is optional and it shall be an UICCApplicationParameters.
RQ8.1.7.41 The applicationParameters can be used to define the access domain for an applet or an RFM instance.
RQ8.1.7.42 The applicationParameters can be used to define the MSL (Minimum Security Level) for an applet or an RFM instance.
RQ8.1.7.43 The processData object is optional and it shall be a SEQUENCE OF OCTET STRING.
RQ8.1.7.44 The processData object octet string shall be directly sent to the respective application instance for processing.
RQ8.1.7.45 The processData object may contain all the bytes contained in a STORE DATA command (Including CLA,INS, P1, P2, L) if required by the application but encryption shall not be used. Note: This test specification will consider this as mandatory otherwise it is not predictable.
RQ8.1.7.46 The processData object shall contain data for the application and no decryption shall be performed by the respective SD.
RQ8.1.7.47 The volatileMemoryQuotaC7 is optional and it shall be an OCTET STRING.
RQ8.1.7.48 The nonvolatileMemoryQuotaC8 is optional and it shall be an OCTET STRING.
RQ8.1.7.49 The globalServiceParameters is optional and it shall be an OCTET STRING.
RQ8.1.7.50 The implicitSelectionParameter is optional and it shall be an OCTET STRING.
RQ8.1.7.51 The volatileReservedMemory is optional and it shall be an OCTET STRING.
RQ8.1.7.52 The nonVolatileReservedMemory is optional and it shall be an OCTET STRING.
RQ8.1.7.53 The ts102226SIMFileAccessToolkitParameter is optional and it shall be an OCTET STRING.
RQ8.1.7.54 The ts102226AdditionalContactlessParameters is optional and it shall be a ts102226AdditionalContactlessParameters.
RQ8.1.7.55 The uiccToolkitApplicationSpecificParametersField is optional and it shall be an OCTET STRING.
RQ8.1.7.56 The uiccAccessApplicationSpecificParametersField is optional and it shall be an OCTET STRING.
RQ8.1.7.57 The uiccAccessParams is optional and it shall be an OCTET STRING.
RQ8.1.7.58 The uiccAdministrativeAccessApplicationSpecificParametersField is optional and it shall be an OCTET STRING.
RQ8.1.7.59 The protocolParameterData is mandatory and it shall be OCTET STRING.
RQ8.1.7.60 The processData object shall be provided to the respective applet instance, with the supported processData method according to GlobalPlatform Card Specification [GP CS].
NOTE: Testing of RQ8.1.7.2, RQ8.1.7.6, RQ8.1.7.28, RQ8.1.7.29, RQ8.1.7.30, RQ8.1.7.37, RQ8.1.7.38, RQ8.1.7.40, RQ8.1.7.41, RQ8.1.7.42, RQ8.1.7.43, RQ8.1.7.44, RQ8.1.7.46, RQ8.1.7.47, RQ8.1.7.48, RQ8.1.7.49, RQ8.1.7.50, RQ8.1.7.51, RQ8.1.7.52, RQ8.1.7.53, RQ8.1.7.54, RQ8.1.7.56, RQ8.1.7.57, RQ8.1.7.58, RQ8.1.7.59 and RQ8.1.7.60 is FFS.
Securing the future of mobile services 51
Security, Identity, Mobility
8.1.8 RFM Parameters
The test requirements are extracted from section 8.8 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
RQ8.1.8.1 RFM Parameters PE shall appear after PE containing the SD or the ADF.
RQ8.1.8.2 RFM Parameters PE is optional and may be used several times.
RQ8.1.8.3 The securityDomainAID object is optional. If present an RFM instance shall be associated with the referenced SD. If not present, the RFM instance shall be associated with the MNO-SD.
RQ8.1.8.4 A RFM instance shall be addressable with a given TAR values.
RQ8.1.8.5 A RFM instance shall be associated with at most one ADF.
RQ8.1.8.6 RFM Parameters PE shall contain PEHeader object.
RQ8.1.8.7 RFM Parameters PE may contain securityDomainAID of ApplicationIdentifier type, tag 15.
RQ8.1.8.8 RFM Parameters shall contain tarList as a sequence of OCTET STRING of size 3, tag 0.
RQ8.1.8.9 RFM Parameters shall contain minimumSecurityLevel of OCTET STRING of size 1, tag 1.
RQ8.1.8.10 The Minimum Security Level (MSL) for the RFM instance shall be interpreted according to ETSI TS 102 226.
RQ8.1.8.11 RFM Parameters shall contain uiccAccessDomain of OCTET STRING of variable size.
RQ8.1.8.12 RFM Parameters shall contain uiccAdminAccessDomain field of OCTET STRING of variable size.
RQ8.1.8.13 RFM Parameters may contain adfRFMAccess of ADFRFMAccess type.
RQ8.1.8.14 ADFRFMAccess object shall contain adfAID of ApplicationIdentifier type.
RQ8.1.8.15 ADFRFMAccess object shall contain adfAccessDomain of OCTET STRING of variable size.
RQ8.1.8.16 ADFRFMAccess object shall contain adfAdminAccessDomain of OCTET STRING of variable size.
RQ8.1.8.17 If adfRFMAccess is not provided, the RFM instance shall be linked only to the MF.
RQ8.1.8.18 If adfRFMAccess is provided, corresponding ADF shall be selected by default in the context of an RFM
script.
RQ8.1.8.19 If adfRFMAccess is not provided, the MF shall be selected by default in the context of an RFM script.
NOTE: Testing of these RQs is FFS.
8.1.9 Non standardised content
The test requirements are extracted from section 8.9 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
RQ8.1.9.1 The Profile Package can use as many PE-NonStandard profile elements as required.
RQ8.1.9.2 PE-NonStandard shall contain a “nonstandard-header” object. The type of the “nonstandard-header” object is PEHeader.
RQ8.1.9.3 PE-NonStandard shall contain an “issuerID” object. The type of the issuerID shall be OBJECT IDENTIFIER.
RQ8.1.9.4 PE-NonStandard shall contain “content” object. The type of the content shall be OCTET STRING.
Note; RQ8.1.9.1, RQ8.1.9.2, RQ8.1.9.3 and RQ8.1.9.4 are out of scope of this specification.
8.1.10 Profile Package end
The test requirements are extracted from section 8.10 of “eUICC Profile Package: Interoperable Format
Technical Specification” [SA PP TS].
RQ8.1.10.1 The PE-End shall contain an “end-header” object. The type of the “end-header” object is PE Header.
RQ8.1.10.2 The support of PE-End is mandatory for eUICC.
RQ8.1.10.3 The PE shall be used as the last element of the Profile Package.
Securing the future of mobile services 52
Security, Identity, Mobility
8.1.11 eUICC Response type
The test requirements are extracted from section 8.11 and 9.5.2 of “eUICC Profile Package: Interoperable
Format Technical Specification” [SA PP TS].
RQ8.1.11.1 EUICCResponse object shall contain peStatus field of SEQUENCE OF PEStatus type.
RQ8.1.11.2 EUICCResponse object main contain profileInstallationAborted field of NULL type.
RQ8.1.11.3 EUICCResponse object may contain statusMessage field of UTF8String type.
RQ8.1.11.4 PEStatus object shall contain status field of INTEGER type.
RQ8.1.11.5 PEStatus object may contain identification field of Uint15 type.
RQ8.1.11.6 The identification field, if present, shall indicate the identification number of the PE triggering the error.
RQ8.1.11.7 The identification field shall be present if any of following statuses are reported: - PE-not-supported. - bad-values.
RQ8.1.11.8 PEStatus object may contain additional-information field of Uint8 type.
RQ8.1.11.9 eUICCResponse with ok status shall be sent at the end of the profile installation when the profile has been processed successfully, and only if there is nothing to report.
RQ8.1.11.10 eUICCResponse with ok status shall not indicate any PE identification.
RQ8.1.11.11 eUICCResponse with PE-not-supported status shall be sent if a specific PE is not supported by the eUICC.
RQ8.1.11.12 eUICCResponse with PE-not-supported status shall include profileInstallationAborted tag if an unsupported PE is indicated as “mandated”.
RQ8.1.11.13 In case of profile installation failure due to internal memory issue, eUICCResponse with memory-failure status shall be sent.
RQ8.1.11.14 bad-values status shall be sent if any of values is out of its acceptable value range.
RQ8.1.11.15 If eUICC has not enough free memory to install the Profile, eUICCResponse with not-enough-memory status shall be sent.
RQ8.1.11.16 If eUICC finds a structure of a PE unkown or badly formatted, eUICCResponse with invalid-request-format status shall be sent.
RQ8.1.11.17 If eUICC does not support a parameter in a particular PE, eUICCResponse with invalid-parameter shall be sent.
RQ8.1.11.18 If any PE-Application in the Profile requires a runtime environment that is not supported by the eUICC, eUICCResponse with runtime-not-supported status shall be sent.
RQ8.1.11.19 If any PE-Application in the Profile depends on a library that is not available in the eUICC, eUICCResponse with lib-not-supported status shall be sent.
RQ8.1.11.20 If a generic file system template indicated by OID is not supported by the eUICC, eUICCResponse with template-not-supported status shall be sent.
RQ8.1.11.21 feature-not-supported status shall be sent if the profile header mentions a feature the eUICC does not support.
RQ8.1.11.22 feature-not-supported status shall be sent if Optional USIM Efs PE contains any of EF GBABP, EF MSK, EF MUK, EF GBANL and EF NAFKCA and respective services are not supported at the eUICC operating system level. In this case, PEStatus object shall contain additional-information field set to ‘1’ if GBA is not supported, to ‘2’ if MBMS if not supported and ‘3’ if both are not supported.
RQ8.1.11.23 If a major version indicated in the Profile header is not supported by the eUICC, eUICCResponse with unsupported-profile-version status shall be sent (in the respect of specified versions).
RQ8.1.11.24 If eUICCResponse contains any of the following statuses: - unsupported-profile-version - not-enough-memory - PE-not-supported and not marked as optional - memory-failure - invalid-request-format the installation of the Profile shall be aborted.
RQ8.1.11.25 If the installation of the Profile is aborted eUICCResponse shall contain profileInstallationAborted tag
NOTE 1: RQ8.1.11.1 is implicitely tested everytime UICC response with PEStatus is sent. NOTE 2: Testing of RQ8.1.11.2, RQ8.1.11.3, RQ8.1.11.4, RQ8.1.11.5, RQ8.1.11.6, RQ8.1.11.7, RQ8.1.11.8, RQ8.1.11.10, RQ8.1.11.11, RQ8.1.11.12, RQ8.1.11.13, RQ8.1.11.14, RQ8.1.11.15, RQ8.1.11.18, RQ8.1.11.19, RQ8.1.11.20, RQ8.1.11.22 and RQ8.1.11.23 is FFS.
Securing the future of mobile services 53
Security, Identity, Mobility
8.2 Test cases / scenarios
8.2.1 Check Profile Format
8.2.1.1. Installing PE-USIM when eUICC supports USIM (File system created
by generic file manager)
FFS
8.2.1.2. Installing PE-USIM when eUICC supports USIM (file system created
by template)
8.2.1.2.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.1.2.2. Initial Conditions
None.
8.2.1.2.3. Test Procedure
Securing the future of mobile services 54
Security, Identity, Mobility
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 .
RQ8.1.1.6 RQ8.1.1.7 RQ8.1.1.8 RQ8.1.1.9 RQ8.1.1.12 RQ8.1.1.13 RQ8.1.1.16 RQ8.1.1.25 RQ8.1.1.26 RQ8.1.1.27 RQ8.1.1.28 RQ8.1.1.29 RQ8.1.1.33 RQ8.1.1.34 RQ8.1.1.39 RQ8.1.2.1 RQ8.1.2.2 RQ8.1.2.3 RQ8.1.2.4 RQ8.1.2.6 RQ8.1.2.8 RQ8.1.2.9 RQ8.1.2.12 RQ8.1.2.13 RQ8.1.2.14 RQ8.1.2.15 RQ8.1.10.1 RQ8.1.10.2 RQ8.1.10.3
2 eUICC → T eUICC responses with PEStatus (0) ok RQ8.1.11.9
3 T ↔ eUICC Enable Test Profile according to 6.11
8.2.1.3. Installing PE-USIM when eUICC does not support USIM
8.2.1.3.1. Test execution
The test procedure shall be run once for each of the following profile:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.1.3.2. Initial Conditions
None.
8.2.1.3.3. Test Procedure
Securing the future of mobile services 55
Security, Identity, Mobility
Step Direction Description RQ
1 T → eUICC Load Test Profile according to 6.10.
RQ8.1.1.6 RQ8.1.1.7 RQ8.1.1.9 RQ8.1.1.12 RQ8.1.2.1 RQ8.1.2.2
2 eUICC → T eUICC responses with PEStatus (10) feature-not-supported eUICC response contains profileInstallationAborted tag.
RQ8.1.11.21 RQ8.1.11.25
3 T ↔ eUICC Enabling Test Profile according to 6.11 fail.
Securing the future of mobile services 56
Security, Identity, Mobility
8.2.1.4. Installing profile without ProfileHeader PE
8.2.1.4.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.1.4.2. Initial Conditions
None.
8.2.1.4.3. Test Procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10.
RQ8.1.1.12 RQ8.1.2.1
2 eUICC → T eUICC responses with PEStatus (5) invalid-request-format. eUICCResponse contains profileInstallationAborted tag.
RQ8.1.11.16 RQ8.1.11.24 RQ8.1.11.25
3 T ↔ eUICC Enabling Test Profile according to 6.11 fail
8.2.1.5. Installing profile with PE-USIM before PE-MF, eUICC reports error.
8.2.1.5.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE_USIM 6.12.1.5
PE_MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.1.5.2. Initial Conditions
None.
Securing the future of mobile services 57
Security, Identity, Mobility
8.2.1.5.3. Test Procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 .
RQ8.1.1.16
2 eUICC → T eUICC responses with PEStatus (5) invalid-request-format. eUICC response contains profileInstallationAborted tag.
RQ8.1.11.24 RQ8.1.11.25
3 T ↔ eUICC Enabling Test Profile according to 6.11 fail
8.2.1.6. Installing profile with PE-Application before PE-SecurityDomain,
eUICC reports error.
8.2.1.6.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE_MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_Application 6.12.1.10
PE_SecurityDomain 6.12.1.8
PE_SecurityDomain 6.12.1.9
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.1.6.2. Initial Conditions
None.
8.2.1.6.3. Test Procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10.
RQ8.1.1.36
2 eUICC → T eUICC responses with PEStatus (5) invalid-request-format or PEStatus (6) invalid-parameter. eUICC response contains profileInstallationAborted tag.
RQ8.1.6.6 RQ8.1.11.16 RQ8.1.11.17 RQ8.1.11.24 RQ8.1.11.25
3 T ↔ eUICC Enabling Test Profile according to 6.11 fail
Securing the future of mobile services 58
Security, Identity, Mobility
8.2.1.7. Installing profile with PE-RFM before PE-SecurityDomain, eUICC
reports error.
8.2.1.7.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE_MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_RFM 6.12.1.11
PE_SecurityDomain 6.12.1.8
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_END 6.12.1.12
8.2.1.7.2. Initial Conditions
None.
8.2.1.7.3. Test Procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10
RQ8.1.1.37
2 eUICC → T eUICC responses with PEStatus (5) invalid-request-format or PEStatus (6) invalid-parameter. eUICC response contains profileInstallationAborted tag.
RQ8.1.6.6 RQ8.1.11.16 RQ8.1.11.17 RQ8.1.11.24 RQ8.1.11.25
3 T ↔ eUICC Enabling Test Profile according to 6.116.11 fail
8.2.1.8. Installing profile with PE-USIM before PE-MF, eUICC supports the
installation.
FFS
8.2.1.9. Installing profile with PE-Application before PE-SecurityDomain,
eUICC supports the installation.
FFS
8.2.1.10. Installing profile with PE-RFM before PE-SecurityDomain, eUICC
supports the installation.
FFS
Securing the future of mobile services 59
Security, Identity, Mobility
8.2.2 Check PE Security Domain
8.2.2.1. Check mandatory elements in PE Security Domain
This test shall check all the mandatory objects.
8.2.2.1.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.2.1.2. Initial conditions
None.
8.2.2.1.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10
2 eUICC → T eUICC responses with PEStatus (0) ok RQ8.1.6.1 RQ8.1.11.9
3 T ↔ eUICC Enable Test Profile according to 6.11
4 T → eUICC Send GET STATUS command to MNO-SD using SCP80 with P1 = ‘80’ P2 = ‘02’ Data = ‘5C 06 4F 9F 70 C5 C4 84’
RQ8.1.6.4 RQ8.1.6.5 RQ8.1.6.7
5 eUICC → T GET STATUS command responses with
AID of MNO-SD (#instanceAID)
Life cycle state (#lifeCyleState)
Privileges (#applicationPrivileges)
Application Executable Load file AID
(#applicationLoadPackageAID)
Executable Module AID (#classAID)
SW=’9000’
Securing the future of mobile services 60
Security, Identity, Mobility
8.2.2.2. Check key list in PE Security Domain
This test shall check if the optional key list object is correctly processed.
8.2.2.2.1. Test execution
The Test Profile is defined as follows: TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.2.2.2. Initial conditions
None
8.2.2.2.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 RQ8.1.6.1
2 eUICC → T eUICC responses with PEStatus (0) ok RQ8.1.11.9
3 T ↔ eUICC Enable Test Profile according to 6.11
4 T → eUICC Send GET DATA command to MNO-SD with P1 = ‘00’ P2 = ‘E0’
RQ8.1.6.1 RQ8.1.6.2 RQ8.1.6.3 RQ8.1.6.4 RQ8.1.6.5 RQ8.1.6.8 RQ8.1.6.10 RQ8.1.6.11 RQ8.1.6.12 RQ8.1.6.13 RQ8.1.6.14 RQ8.1.6.15 RQ8.1.6.16 RQ8.1.6.17 RQ8.1.6.18 RQ8.1.6.19 RQ8.1.6.21 RQ8.1.6.26
5 eUICC → T GET DATA command responses with
key information data containing #keyIdentifier, #keyVersionNumber
and #keyType.
SW=’9000’
Securing the future of mobile services 61
Security, Identity, Mobility
6 T → eUICC Send GET_STATUS command using SCP80 to MNO-SD with P1 = ‘80’ P2= ‘02’ Data = ‘5C 06 4F 9F 70 C5 C4 84’
RQ8.1.6.4 RQ8.1.6.5 RQ8.1.6.7 RQ8.1.6.18 RQ8.1.6.34 RQ8.1.6.35 RQ8.1.6.37 RQ8.1.6.38
7
eUICC → T
GET STATUS command responses with
AID of MNO-SD (#instanceAID)
Life cycle state (#lifeCyleState)
Privileges (#applicationPrivileges)
Application Executable Load file AID
(#applicationLoadPackageAID)
Executable Module AID (#classAID)
SW=’9000’
8
T
1) Decrypt the response packet with the
#SCP80_ENC_KEY
2) Verify the cryptographic checksum using
#SCP80_AUTH_KEY
8.2.2.3. Check number of keyComponent objects
This test shall check if keyComponent is assigned just once per key.
8.2.2.3.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.2.1.2
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.2.3.2. Initial conditions
None
8.2.2.3.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according. To 6.10. RQ8.1.6.27
2 eUICC → T eUICC response shall contain at least one PEStatus different from ok (0)
Securing the future of mobile services 62
Security, Identity, Mobility
8.2.2.4. Check sdPersoData
This test shall check if sdPersoData is processed.
8.2.2.4.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.2.1.3
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.2.4.2. Initial conditions
None
8.2.2.4.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 RQ8.1.6.1
2 eUICC → T eUICC responses with PEStatus (0) ok RQ8.1.11.9
3 T ↔ eUICC Enable Test Profile according to 6.11
4 T → eUICC Send GET DATA command to MNO-SD with P1 = ‘00’ P2 = ‘42’ (Issuer Identification Number)
RQ8.1.6.28 RQ8.1.6.29 RQ8.1.6.30 RQ8.1.6.31
5 eUICC → T GET DATA command responses with
IIN out of #sdPersoData.
SW=’9000’
6 T → eUICC Send GET DATA command to MNO-SD with P1 = ‘00’
P2 = ‘45’ (Card Image Number)
RQ8.1.6.28 RQ8.1.6.29 RQ8.1.6.30 RQ8.1.6.31
7 eUICC → T GET DATA command responses with
CIN out of #sdPersoData.
SW=’9000’
Securing the future of mobile services 63
Security, Identity, Mobility
8.2.2.5. Check OTA HTTPs Personalisation
This test shall check if MNO_SD is personalised with OTA HTTPs Data.
8.2.2.5.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_PINCodes 6.12.1.6
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.2.1.4
PE_SecurityDomain 6.12.1.9
PE_Application 6.12.1.10
PE_RFM 6.12.1.11
PE_END 6.12.1.12
8.2.2.5.2. Initial conditions
None
8.2.2.5.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 RQ8.1.6.1
2 eUICC → T eUICC responses with PEStatus (0) ok RQ8.1.11.9
3 T ↔ eUICC Enable Test Profile according to 6.11
4 T → eUICC Send GET DATA command to MNO-SD with P1 = ‘00’ P2 = ‘85’
RQ8.1.6.36 RQ8.1.7.45
5 eUICC → T GET DATA command responses with
Security Domain Administration Session
Parameters contained in #processData.
SW=’9000’
Securing the future of mobile services 64
Security, Identity, Mobility
8.2.3 Check PE Application
8.2.3.1. Check Application PE (PE_Applet) and mandatory elements in
ApplicationInstance
8.2.3.1.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE-Application 6.12.1.10
PE_END 6.12.1.12
8.2.3.1.2. Initial conditions
None
8.2.3.1.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 RQ8.1.1.6 RQ8.1.1.7 RQ8.1.1.9 RQ8.1.7.4 RQ8.1.7.5 RQ8.1.7.7 RQ8.1.7.8 RQ8.1.7.9 RQ8.1.7.20 RQ8.1.7.21 RQ8.1.7.22 RQ8.1.7.23 RQ8.1.7.24 RQ8.1.7.25 RQ8.1.7.26 RQ8.1.7.27 RQ8.1.7.31 RQ8.1.7.32 RQ8.1.7.33 RQ8.1.7.34 RQ8.1.7.35 RQ8.1.7.36 RQ8.1.7.39 RQ8.1.7.55
2 eUICC → T eUICC responses with PEStatus (0) ok RQ8.1.11.9
3 T ↔ eUICC Enable Test Profile (see description in 6.11)
4 T → eUICC Send GET STATUS command to MNO-SD using SCP80 with P1 = ‘40’ P2 = ‘02’ Data =’4F LL #instanceAID 5C 06 4F 9F 70 C5 C4 84’
RQ8.1.6.7
5 eUICC → T GET STATUS command responses with
AID of application (#instanceAID)
Life cycle state (#lifeCyleState)
Privileges (#applicationPrivileges)
Securing the future of mobile services 65
Security, Identity, Mobility
Application Executable Load file AID
(#applicationLoadPackageAID)
Executable Module AID (#classAID)
SW=’9000’
8.2.3.2. Check all elements in ApplicationLoadPackage – taking size into
account.
8.2.3.2.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE-Application 6.12.2.2.2
PE_END 6.12.1.12
8.2.3.2.2. Initial conditions
None
8.2.3.2.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 RQ8.1.7.8 RQ8.1.7.9 RQ8.1.7.10 RQ8.1.7.11 RQ8.1.7.12 RQ8.1.7.13 RQ8.1.7.14 RQ8.1.7.15 RQ8.1.7.16 RQ8.1.7.17 RQ8.1.7.18 RQ8.1.7.19 RQ8.1.7.20 RQ8.1.7.21
2 eUICC → T If O_MEMORY_LIMIT , the eUICC responses with PEStatus (4) not-enough-memory and the eUICC response contains profileInstallationAborted tag If not O_MEMORY_LIMIT, the eUICC responses with PEStatus (0) ok or with PEStatus (6) invalid-parameter
RQ8.1.11.13 RQ8.1.11.25 RQ8.1.11.9 RQ8.1.11.17
3 T ↔ eUICC If O_MEMORY_LIMIT enabling the Test Profile according to 6.11 fail. If not O_MEMORY_LIMIT the result of enabling the Test Profile according to 6.11 is unspecified.
Securing the future of mobile services 66
Security, Identity, Mobility
8.2.3.3. Check all elements in ApplicationInstance
8.2.3.3.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE-Application 6.12.2.2.3
PE_END 6.12.1.12
8.2.3.3.2. Initial conditions
None
8.2.3.3.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 RQ8.1.7.4 RQ8.1.7.5 RQ8.1.7.22 RQ8.1.7.23 RQ8.1.7.24 RQ8.1.7.25 RQ8.1.7.26 RQ8.1.7.27 RQ8.1.7.28 RQ8.1.7.29 RQ8.1.7.30 RQ8.1.7.31 RQ8.1.7.32 RQ8.1.7.33 RQ8.1.7.34 RQ8.1.7.35 RQ8.1.7.36 RQ8.1.7.37 RQ8.1.7.38 RQ8.1.7.39 RQ8.1.7.40 RQ8.1.7.41 RQ8.1.7.42 RQ8.1.7.47 RQ8.1.7.48 RQ8.1.7.50 RQ8.1.7.51 RQ8.1.7.52 RQ8.1.7.55 RQ8.1.7.57 RQ8.1.7.58
2 eUICC → T eUICC responses with PEStatus (0) ok RQ8.1.11.9
3 T ↔ eUICC Enable Test Profile (see description in 6.11)
Securing the future of mobile services 67
Security, Identity, Mobility
4 T → eUICC Send GET STATUS command to MNO-SD using SCP80 with P1 = ‘40’ P2 = ‘02’ Data =’4F LL #instanceAID 5C 06 4F 9F 70 C5 C4 84’
RQ8.1.6.7
5 eUICC → T GET STATUS command responses with
AID of application (#instanceAID)
Life cycle state (#lifeCyleState)
Privileges (#applicationPrivileges)
Application Executable Load file AID
(#applicationLoadPackageAID)
Executable Module AID (#classAID) SW=’9000’
8.2.3.4. Error when load a PE-Applet4 and bad library is provided.
8.2.3.4.1. Test execution
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE-Application 6.12.2.2.4
PE_END 6.12.1.12
8.2.3.4.2. Initial conditions
None
8.2.3.4.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 RQ8.1.1.6 RQ8.1.1.7 RQ8.1.1.9 RQ8.1.7.1 RQ8.1.7.7 RQ8.1.7.8 RQ8.1.7.9
2 eUICC → T eUICC response with PEStatus (8) lib-not-supported and the eUICC response contains profileInstallationAborted tag
RQ8.1.11.19 RQ8.1.11.25
3 T ↔ eUICC Enabling Test Profile according to 6.11 fail
Securing the future of mobile services 68
Security, Identity, Mobility
8.2.3.5. Check multiple ApplicationInstance.
8.2.3.5.1. Test execution
This test is executed only if multiple instances are supported
The Test Profile is defined as follows:
TYPE VALUE or REFERENCE
ProfileHeader 6.12.1.1
PE-MF 6.12.1.2
PE_PUKCodes 6.12.1.3
PE_PINCodes 6.12.1.4
PE_USIM 6.12.1.5
PE_AKAParameters 6.12.1.7
PE_SecurityDomain 6.12.1.8
PE-Application 6.12.2.2.5
PE_END 6.12.1.12
8.2.3.5.2. Initial conditions
None
8.2.3.5.3. Test procedure
Step Direction Description RQ
1 T → eUICC Load Test Profile to the eUICC according to 6.10 RQ8.1.1.6 RQ8.1.1.7 RQ8.1.1.9 RQ8.1.7.3 RQ8.1.7.7 RQ8.1.7.8 RQ8.1.7.9 RQ8.1.7.20 RQ8.1.7.21 RQ8.1.7.22 RQ8.1.7.23 RQ8.1.7.24 RQ8.1.7.25 RQ8.1.7.26 RQ8.1.7.27 RQ8.1.7.31 RQ8.1.7.32 RQ8.1.7.33 RQ8.1.7.35 RQ8.1.7.36
2 eUICC → T eUICC response with PEStatus (0) ok RQ8.1.11.9
3 T → eUICC Enable Test Profile (see description in 6.11)
4 T → eUICC Send GET STATUS command to MNO-SD using SCP80 with P1 = ‘40’ P2 = ‘02’ Data =’4F LL #instanceAID 5C 06 4F 9F 70 C5 C4 84’ (first application)
RQ8.1.6.7
5 eUICC → T GET STATUS command responses with
AID of application1 (#instanceAID)
Life cycle state (#lifeCyleState)
Privileges (#applicationPrivileges)
Securing the future of mobile services 69
Security, Identity, Mobility
Application Executable Load file AID
(#applicationLoadPackageAID)
Executable Module AID (#classAID)
SW=’9000’
6 T → eUICC Send GET STATUS command to MNO-SD using SCP80 with P1 = ‘40’ P2 = ‘02’ Data =’4F LL #instanceAID (second application) 5C 06 4F 9F 70 C5 C4 84’
RQ8.1.6.7 RQ8.1.7.3
7 eUICC → T GET STATUS command responses with
AID of application2 (#instanceAID)
Life cycle state (#lifeCyleState)
Privileges (#applicationPrivileges)
Application Executable Load file AID
(#applicationLoadPackageAID)
Executable Module AID (#classAID)
SW=’9000’
Securing the future of mobile services 70
Security, Identity, Mobility
9. ANNEX A (Informative) : Document history
The table below indicates changes that have been incorporated into the present document since it was created
by SIMalliance.
Version Date Brief Description of Change
V1.0. 14/04/2016 1st Release of Document